Permiso-io-tools / SkyScalpelView external linksLinks
☆46Nov 7, 2024Updated last year
Alternatives and similar repositories for SkyScalpel
Users that are interested in SkyScalpel are comparing it to the libraries listed below
Sorting:
- ☆30Jan 13, 2026Updated last month
- ☆18Feb 2, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Feb 5, 2025Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Jan 2, 2025Updated last year
- A tool that allows downloading S3 directories as ZIP files☆35Apr 28, 2023Updated 2 years ago
- ☆26May 6, 2024Updated last year
- deep file scanner tool☆41Aug 13, 2025Updated 6 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- ☆192Apr 16, 2025Updated 9 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- ☆14Jan 8, 2026Updated last month
- JMESPath Community specification.☆13May 23, 2025Updated 8 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- ☆27Oct 1, 2025Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 4 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Jan 25, 2025Updated last year
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆197Feb 2, 2026Updated last week
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆69Oct 30, 2024Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated last month
- Scan your account for the use of untrusted AMIs☆31Updated this week