A comprehensive catalog of cloud attack techniques with executable commands and interactive simulations. Built on MITRE ATT&CK and AWS Threat Technique Catalog, enhanced with real AWS CLI commands and the Cloud Attack Language.
Theoretical descriptions of how adversaries exploit cloud environments
Interactive interface for executing attack commands via the AWS CLI and Cloud Attack Language
Search and filter AWS attack techniques by service, tactic, or keyword
Get notified when we add new content including techniques, services, and attack emulations.