Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.
β374Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for cloud-snitch
Users that are interested in cloud-snitch are comparing it to the libraries listed below
Sorting:
- AWS Trustline: Check external access on your AWS accountβ129Feb 27, 2026Updated 3 weeks ago
- π Envilder is a CLI that securely centralizes your environment variables from AWS SSM as a single source of truthβ134Updated this week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events iβ¦β51Nov 9, 2025Updated 4 months ago
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- Putting a leash on naughty AWS permissionsβ135Sep 5, 2025Updated 6 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findingβ¦β50Jul 4, 2025Updated 8 months ago
- CLI tool for searching logs and unstructured content in Amazon S3 bucketsβ216Jul 8, 2025Updated 8 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β100Mar 14, 2026Updated last week
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated last month
- Get notified when actions are taken in the AWS Console.β331Jan 20, 2025Updated last year
- AWS honey token managerβ90Aug 1, 2024Updated last year
- select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, rβ¦β543Updated this week
- TUI explorer application for Amazon S3 (AWS S3) πͺ£β859Mar 8, 2026Updated 2 weeks ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versionsβ¦β88Updated this week
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 2 months ago
- CloudFormation template to create reasonable account defaults around Cost Surprise Alertingβ172Dec 11, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by β¦β121Sep 2, 2025Updated 6 months ago
- β23Mar 4, 2025Updated last year
- AWS Attack Path Management Tool - Walking on the Moonβ263Dec 5, 2024Updated last year
- π¦ Produce secure packages and containers with declarative configurationsβ284Updated this week
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.β129Feb 27, 2026Updated 3 weeks ago
- Scalable integrity framework for ABAC on AWSβ56Mar 14, 2025Updated last year
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β171Dec 7, 2025Updated 3 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, inβ¦β81Jul 25, 2025Updated 7 months ago
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 8 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.β161Dec 22, 2025Updated 3 months ago
- A tool to uncover undocumented APIs from the AWS Console.β120Updated this week
- Google Maps for AWS IAMβ271Updated this week
- Safer AWS SCP deployments via real-time monitoringβ56Sep 30, 2023Updated 2 years ago
- Identify the blast radius and risks for Terraform changes in real timeβ183Updated this week
- Create tar/zip archives that try to exploit zipslip vulnerability.β48Sep 20, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. β¦β36Mar 10, 2026Updated last week
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β111May 30, 2025Updated 9 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potentialβ¦β106Dec 2, 2024Updated last year
- find dangling domains in a multi cloud environmentβ176Dec 25, 2025Updated 2 months ago
- Validate the isolation posture of your container environment.β314Feb 11, 2026Updated last month