Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.
β373Dec 6, 2025Updated 2 months ago
Alternatives and similar repositories for cloud-snitch
Users that are interested in cloud-snitch are comparing it to the libraries listed below
Sorting:
- KYE: Know Your Enemies - Check external access on your AWS accountβ129Apr 25, 2025Updated 10 months ago
- π Envilder is a CLI that securely centralizes your environment variables from AWS SSM as a single source of truthβ133Feb 22, 2026Updated last week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events iβ¦β51Nov 9, 2025Updated 3 months ago
- CLI tool for searching logs and unstructured content in Amazon S3 bucketsβ215Jul 8, 2025Updated 7 months ago
- Putting a leash on naughty AWS permissionsβ135Sep 5, 2025Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findingβ¦β50Jul 4, 2025Updated 7 months ago
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated 11 months ago
- AWS honey token managerβ89Aug 1, 2024Updated last year
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated last month
- select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, rβ¦β538Updated this week
- Get notified when actions are taken in the AWS Console.β330Jan 20, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β98Updated this week
- TUI explorer application for Amazon S3 (AWS S3) πͺ£β854Jan 31, 2026Updated last month
- Scalable integrity framework for ABAC on AWSβ56Mar 14, 2025Updated 11 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.β161Dec 22, 2025Updated 2 months ago
- β42Nov 13, 2025Updated 3 months ago
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β168Dec 7, 2025Updated 2 months ago
- CloudFormation template to create reasonable account defaults around Cost Surprise Alertingβ172Dec 11, 2024Updated last year
- β23Mar 4, 2025Updated 11 months ago
- Identify the blast radius and risks for Terraform changes in real timeβ182Updated this week
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versionsβ¦β88Updated this week
- A tool to uncover undocumented APIs from the AWS Console.β116Apr 29, 2025Updated 10 months ago
- π¦ Produce secure packages and containers with declarative configurationsβ276Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40May 7, 2023Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moonβ261Dec 5, 2024Updated last year
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Platβ¦β11Nov 20, 2025Updated 3 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β113Nov 13, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β109May 30, 2025Updated 9 months ago
- Crowdsourced list of sensitive IAM Actionsβ159Oct 29, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by β¦β121Sep 2, 2025Updated 5 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. β¦β36Updated this week
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.β129Feb 13, 2026Updated 2 weeks ago
- Safer AWS SCP deployments via real-time monitoringβ56Sep 30, 2023Updated 2 years ago
- find dangling domains in a multi cloud environmentβ175Dec 25, 2025Updated 2 months ago
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 7 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, inβ¦β81Jul 25, 2025Updated 7 months ago
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 2 months ago
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.β301Feb 20, 2026Updated last week
- A Golang program to rotate AWS & GCP account keysβ67May 12, 2025Updated 9 months ago