When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud
☆45Dec 7, 2025Updated 3 months ago
Alternatives and similar repositories for SkyEye
Users that are interested in SkyEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated last month
- An AWS IAM Privilege Escalation Path Library☆124Mar 16, 2026Updated last week
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated last month
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Google Maps for AWS IAM☆271Updated this week
- Continuous Security on AWS Workshop (CSOA) published by Pearson☆11Aug 14, 2022Updated 3 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- Saludetes tipicos☆10Oct 11, 2023Updated 2 years ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- ☆18Jan 20, 2026Updated 2 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Feb 14, 2025Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Super fast duplicate file finder written in Golang.☆44Mar 16, 2026Updated last week
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Azure AD Security controls check.☆16Feb 25, 2023Updated 3 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- A minimalistic approach to interact with RabbitMQ☆10Mar 3, 2026Updated 3 weeks ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 4 months ago
- A high-performance TUI-based packet crafting tool written in Rust.☆34Dec 25, 2025Updated 3 months ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Official urlscan.io and urlscan Pro CLI tool☆31Updated this week
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week