☆124May 26, 2025Updated 9 months ago
Alternatives and similar repositories for orca-toolbox
Users that are interested in orca-toolbox are comparing it to the libraries listed below
Sorting:
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- ☆229Mar 10, 2026Updated last week
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- ☆11May 1, 2024Updated last year
- Clean accounts over permissions in GCP infra at scale☆71May 9, 2023Updated 2 years ago
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 3 months ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 3 months ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- Convert JSON IAM Policies to other formats☆26Mar 14, 2026Updated last week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- IAMTrail☆499Updated this week
- ☆55Apr 25, 2023Updated 2 years ago
- Daily Updates of AWS IAM Data☆22Mar 14, 2026Updated last week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- ☆30Jan 13, 2026Updated 2 months ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- AWS CloudSaga - Simulate security events in AWS☆474Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- ☆21Apr 17, 2023Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆82Updated this week
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Nov 13, 2023Updated 2 years ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- ☆71Jan 8, 2025Updated last year
- ☆13Aug 29, 2024Updated last year
- A crowdsourced AWS IAM permissions reference.☆102Feb 2, 2026Updated last month
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago