ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
☆1,037Feb 9, 2026Updated 2 months ago
Alternatives and similar repositories for ElectricEye
Users that are interested in ElectricEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A command-line tool to get valuable information out of AWS CloudTrail☆833Apr 27, 2026Updated last week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,205Updated this week
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆552Jul 13, 2025Updated 9 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,438Apr 17, 2026Updated 2 weeks ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆82Jul 8, 2021Updated 4 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- IAM Least Privilege Policy Generator☆2,147Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,550Aug 2, 2024Updated last year
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,732Updated this week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆601Apr 8, 2026Updated 3 weeks ago
- ☆376Feb 23, 2024Updated 2 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,004Oct 4, 2022Updated 3 years ago
- AWS IAM linting library☆1,115Jan 7, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open Cloud Security Posture Management Engine☆346Feb 19, 2022Updated 4 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,280Jul 15, 2024Updated last year
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Apr 13, 2026Updated 3 weeks ago
- Multi-Cloud Security Auditing Tool☆7,641Sep 23, 2025Updated 7 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,554Apr 27, 2026Updated last week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,166Apr 27, 2026Updated last week
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,862Updated this week
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PacBot (Policy as Code Bot)☆1,305Dec 8, 2022Updated 3 years ago
- Self-service creation and deletion of sandbox-style accounts.☆346Mar 4, 2023Updated 3 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,171Dec 8, 2022Updated 3 years ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,670Jan 8, 2025Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Sep 17, 2021Updated 4 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 11 months ago
- Discover resources created in an AWS account.☆737Apr 5, 2024Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆274Updated this week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,130Mar 10, 2026Updated last month
- Granular, Actionable Adversary Emulation for the Cloud☆2,304Updated this week
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,979Updated this week
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆633Jan 14, 2026Updated 3 months ago