☆30Jan 13, 2026Updated 3 months ago
Alternatives and similar repositories for cloudtail
Users that are interested in cloudtail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 2, 2026Updated 2 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- ☆46Nov 7, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- ☆11Dec 9, 2025Updated 4 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- An AI-backed threat hunting assistant that aligns to the PEAK framework.☆41Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- ☆40Aug 2, 2024Updated last year
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆83Jan 6, 2026Updated 3 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Security tool against dependency typosquatting attacks☆56Updated this week
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆30Oct 13, 2024Updated last year
- cloudgrep is grep for cloud storage☆329Mar 14, 2026Updated last month
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable supp…☆19Apr 7, 2026Updated 3 weeks ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 10 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- AWS docs, guides, and other tools☆75Feb 4, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- Turn any blog into structured threat intelligence.☆57Apr 22, 2026Updated last week
- Security Alert Decoration☆27Jul 21, 2025Updated 9 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Apr 13, 2026Updated 2 weeks ago