TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events in AWS.
☆51Nov 9, 2025Updated 3 months ago
Alternatives and similar repositories for TrailAlerts
Users that are interested in TrailAlerts are comparing it to the libraries listed below
Sorting:
- AWS Trustline: Check external access on your AWS account☆129Updated this week
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ☆30Jan 13, 2026Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated last week
- ☆23Mar 4, 2025Updated last year
- Scripts to quickly fix security and compliance issues☆28Feb 9, 2026Updated 3 weeks ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆373Dec 6, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- List of known AWS accounts☆257Feb 6, 2026Updated 3 weeks ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- Generate datasets of cloud audit logs for common attacks☆234Feb 13, 2026Updated 2 weeks ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- ☆23Sep 20, 2024Updated last year
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Configuration Language for Mortals☆12Feb 19, 2026Updated 2 weeks ago
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- ☆53Oct 27, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- 🚀 Envilder is a CLI that securely centralizes your environment variables from AWS SSM as a single source of truth☆133Feb 22, 2026Updated last week
- ☆37Apr 9, 2025Updated 10 months ago
- ☆19Jan 31, 2025Updated last year
- Checks Hard to Find Size Limits and Usage for AWS such as AWS IAM☆46Sep 10, 2025Updated 5 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month