Open Cloud Security Posture Management Engine
☆346Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for opencspm
Users that are interested in opencspm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆201Aug 29, 2024Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆552Jul 13, 2025Updated 9 months ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,036Feb 9, 2026Updated 2 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,203Apr 21, 2026Updated last week
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,550Aug 2, 2024Updated last year
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,170Dec 8, 2022Updated 3 years ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Apr 15, 2026Updated 2 weeks ago
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆397Sep 16, 2021Updated 4 years ago
- Tweets when new GCP IAM updates are found☆13Apr 16, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated last year
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,840Updated this week
- ☆376Feb 23, 2024Updated 2 years ago
- Multi-Cloud Security Auditing Tool☆7,641Sep 23, 2025Updated 7 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆910Dec 17, 2024Updated last year
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,972Apr 23, 2026Updated last week
- AWS IAM linting library☆1,114Jan 7, 2026Updated 3 months ago
- ☆141Mar 29, 2023Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,279Jul 15, 2024Updated last year
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,687Updated this week
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,438Apr 17, 2026Updated 2 weeks ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,004Oct 4, 2022Updated 3 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,554Updated this week
- IAM Least Privilege Policy Generator☆2,144Apr 14, 2026Updated 2 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Jul 23, 2021Updated 4 years ago
- ☆39Aug 13, 2021Updated 4 years ago