2.27    AADInternals-azure                       3.
68     cloud Insecure Storage
1.72    Access Logs                              5.78     Cloud Logging
5.68    Account Discovery-Cloud                  5.76     Cloud Mapper-for AWS
1.33    After Action Report                      5.48     Cloud Persistence
4.11    AppArmor -metasploit                     5.67     Cloud Post Exploitation
5.12    appidsvc                                 2.51     Cloud Process (Scanning)
5.8     Application Allow List                   2.49     Cloud Scanning
5.12    Application Identity service             2.56     Cloud Scanning (Attributing Hosts)
5.8     Applocker                                2.59     Cloud Scanning (EyeWitness)
3.45    Argon2                                   2.52     Cloud Scanning (IP address Enumeration)
1.12    Argous Corporation                       2.52     Cloud Scanning (Wget and JQ tools)
4.6     Armitage (Metasploit GUI)                2.61     Cloud Scanning Defense
5.23    arp_scanner                              254      Cloud Scanning(Masscan)
1.61    ASEPs                                    2.57     Cloud Scanning(TLS-Scan)
1.18    AssetMgtAcct                             4.84     Cloud Spotligh SSRF and IMDS
4.11    Attack Framework Defense (Preparation)   4.75     Cloud SQL
1.1O3   Augmenting IR                            3.7O     Cloud Storage Access
3.2O    AWS API Gateway                          4.22     Code Executing Microsoft Office files
3.73    Azure Scanning                           5.7      Code Wrapping
3.19    Azure Smart Lockout                      4.38     Command Injection
5.76    AzViz-for azure                          1.16     Command Injection (Green Penguin)
3.73    Basic Blob Finder                        4.45     Command Injection Defenses
4.29    BeEF                                     4.44     Command Injection in IoT
1.88    Behavioral Analysis                      4.39     Command Injection Vulnerability
1.70    Berkeley Packet Filters                  4.43     Command Stacking
2.18    Bind DNS                                 2.15     Common name (CN)
5.11    Bitsadmin                                3.1O     Compromised Password List
3.69    Bucket ACL                               1.29     Containment
3.78    Bucket Discovery                         4.6O     Content Security Policy
3.71    Bucket Finder(Tool)                      4.25     Conventional Exploit Delivery
2.51    Builtwith                                2.72     Copernic Desktop Search
2.15    Certificate Authority                    5.41     Create account with meterpreter
5.45    Certificate Authority (CA)               3.8      Credential Stuffing
2.15    Certificate Transparency                 4.44     Crestron DGE-100
5.11    Certutil                                 4.5O     Cross Site scripting(XSS)
2.25    CeWL                                     1.26     crowdstrike and DFIR track sheets
3.73    Cloud - Azure Scanning                   1.45     CyberChef
4.92    Cloud - IMDS Credential Exfilteration    3.42     Decoding Unix and Linux Passwords
5.69    Cloud - Priviliedge Escalation           5.6      Defender Check
3.71    Cloud - S3 Scanning                      4.97     Defending SSRF and IMDS
3.72    Cloud - Scanning GCB                     2.29     DeHashed
3.8O    Cloud - Storage Logging                  110.00   Deobfuscation attacker code