☆71Jan 8, 2025Updated last year
Alternatives and similar repositories for IAMGraph
Users that are interested in IAMGraph are comparing it to the libraries listed below
Sorting:
- ☆229Updated this week
- ☆14Jan 8, 2026Updated last month
- ☆18Jul 30, 2024Updated last year
- ☆14Mar 6, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Updated this week
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆261Dec 5, 2024Updated last year
- ☆55Apr 25, 2023Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆78Feb 25, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 5 months ago
- ☆29Dec 26, 2025Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆75May 27, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Dropwizard Integration with Jetty HTTP/1.1 and HTTP/2 client☆11Feb 2, 2026Updated 3 weeks ago
- ☆51Jun 13, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud