Compares and analyzes GCP IAM roles.
☆79Mar 9, 2025Updated last year
Alternatives and similar repositories for gcp-iam-analyzer
Users that are interested in gcp-iam-analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 20, 2022Updated 3 years ago
- Tweets when new GCP IAM updates are found☆13Updated this week
- ☆116Feb 11, 2026Updated 2 months ago
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago
- Take automated actions against threats and vulnerabilities.☆215Sep 14, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆22Apr 17, 2023Updated 3 years ago
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 5 years ago
- ☆231Mar 27, 2026Updated 3 weeks ago
- ☆25Jun 27, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆124May 26, 2025Updated 10 months ago
- ☆65May 21, 2024Updated last year
- A comprehensive scanner for Google Cloud☆357Dec 5, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- ☆170Sep 30, 2025Updated 6 months ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆30Apr 3, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Provides an alternative, or maybe a more user friendly way to use the native boto3 API.☆28Apr 14, 2023Updated 3 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆93Mar 17, 2025Updated last year
- ☆30Jan 13, 2026Updated 3 months ago
- WAF bypass PoC☆51Oct 9, 2023Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆287Updated this week
- ☆35Jan 27, 2023Updated 3 years ago
- ☆73May 13, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆373Apr 1, 2026Updated 2 weeks ago
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Apr 6, 2026Updated last week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- ☆60May 25, 2023Updated 2 years ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated 3 weeks ago