Permiso-io-tools / CloudConsoleCartographerView external linksLinks
Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user input actions in the management console UI for simplified analysis and explainability.
☆173May 16, 2024Updated last year
Alternatives and similar repositories for CloudConsoleCartographer
Users that are interested in CloudConsoleCartographer are comparing it to the libraries listed below
Sorting:
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- ☆30Jan 13, 2026Updated last month
- ☆11Dec 9, 2025Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆103Feb 7, 2026Updated last week
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆260Dec 5, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- ☆71Jan 8, 2025Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- ☆228Jan 29, 2026Updated 2 weeks ago
- Generate datasets of cloud audit logs for common attacks☆232Updated this week
- ☆46Nov 7, 2024Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆73Oct 21, 2024Updated last year
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆433Feb 6, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,126Dec 19, 2025Updated last month
- ☆10Aug 11, 2025Updated 6 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- ☆10Jan 22, 2025Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆266Jan 26, 2023Updated 3 years ago