Cloud Security Posture Management (CSPM)
☆3,704Feb 20, 2026Updated last week
Alternatives and similar repositories for cloudsploit
Users that are interested in cloudsploit are comparing it to the libraries listed below
Sorting:
- Multi-Cloud Security Auditing Tool☆7,551Sep 23, 2025Updated 5 months ago
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,103Updated this week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,405Oct 16, 2025Updated 4 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,184Feb 20, 2026Updated last week
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,260Jul 15, 2024Updated last year
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,936Feb 20, 2026Updated last week
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,487Feb 12, 2026Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,295Updated this week
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆907Dec 17, 2021Updated 4 years ago
- Tfsec is now part of Trivy☆6,956Nov 10, 2025Updated 3 months ago
- Security Remediation Guides☆746Nov 24, 2025Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,266Feb 13, 2026Updated 2 weeks ago
- Hunt for security weaknesses in Kubernetes clusters☆5,004Mar 19, 2024Updated last year
- Security auditing tool for AWS environments☆1,725Nov 28, 2018Updated 7 years ago
- Open Cloud Security Posture Management Engine☆344Feb 19, 2022Updated 4 years ago
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,200Nov 20, 2025Updated 3 months ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,280Updated this week
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆752Oct 14, 2023Updated 2 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,684Jan 8, 2024Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,997Dec 11, 2025Updated 2 months ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 7 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,005Feb 16, 2026Updated last week
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆906Dec 17, 2024Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,729Updated this week
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,306Oct 29, 2025Updated 3 months ago
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,372Feb 11, 2021Updated 5 years ago
- Open Source Cloud Native Application Protection Platform (CNAPP)☆5,234Jan 8, 2026Updated last month
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,943Feb 20, 2026Updated last week
- Find, verify, and analyze leaked credentials☆24,643Feb 20, 2026Updated last week
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,358Nov 8, 2024Updated last year
- PacBot (Policy as Code Bot)☆1,306Dec 8, 2022Updated 3 years ago
- Open Source Vulnerability Management Platform☆6,266Feb 13, 2026Updated 2 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,802Sep 17, 2024Updated last year
- Cloud Native Runtime Security☆8,690Updated this week