Permiso-io-tools / CloudGrapplerView external linksLinks
CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure.
☆265Nov 21, 2025Updated 2 months ago
Alternatives and similar repositories for CloudGrappler
Users that are interested in CloudGrappler are comparing it to the libraries listed below
Sorting:
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- ☆30Jan 13, 2026Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆71Jan 8, 2025Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆684Jan 6, 2026Updated last month
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆433Feb 6, 2026Updated last week
- ☆124May 26, 2025Updated 8 months ago
- AWS honey token manager☆89Aug 1, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- ☆228Jan 29, 2026Updated 2 weeks ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆103Feb 7, 2026Updated last week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated last month
- Generate datasets of cloud audit logs for common attacks☆232Feb 8, 2026Updated last week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆40Aug 15, 2025Updated 6 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 2 months ago
- ☆18Jan 31, 2025Updated last year
- ☆14Jan 8, 2026Updated last month
- Common Golang Packages for use by the Various Cloud Nuke Tools☆54Feb 3, 2026Updated last week
- ☆41Nov 29, 2024Updated last year