Add a layer of active defense to your cloud applications.
☆106Apr 23, 2026Updated last week
Alternatives and similar repositories for cloud-active-defense
Users that are interested in cloud-active-defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173May 16, 2024Updated last year
- ☆75Mar 19, 2025Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 11 months ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆18Apr 27, 2026Updated last week
- ☆18Jul 30, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆122Apr 25, 2026Updated last week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- ☆30Jan 13, 2026Updated 3 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Apr 13, 2026Updated 3 weeks ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Apr 20, 2026Updated 2 weeks ago
- Convert JSON IAM Policies to other formats☆26Apr 26, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple ethernet interface traffic monitor and reporting tool☆96Mar 10, 2026Updated last month
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Lambda function that streamlines containment of an AWS account compromise☆345Dec 1, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- SSH Multipot☆24Apr 30, 2018Updated 8 years ago
- Workflows for Shuffle☆25Oct 26, 2022Updated 3 years ago
- Tools for interacting with authentication packages using their individual message protocols☆433Apr 1, 2026Updated last month
- A universal SBOM representation in protocol buffers☆323Apr 26, 2026Updated last week
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆202Jan 6, 2026Updated 3 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated 2 months ago
- Tweets when new GCP IAM updates are found☆13Apr 16, 2026Updated 2 weeks ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago