all paths lead to clouds
☆640Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for gitoops
Users that are interested in gitoops are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Domain Protect - prevent subdomain takeover☆397Dec 23, 2024Updated last year
- WeirdAAL (AWS Attack Library)☆838Jan 13, 2025Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated 2 weeks ago
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 8 months ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,000Oct 4, 2022Updated 3 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,692Jan 8, 2024Updated 2 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,326Mar 15, 2026Updated last week
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆912Dec 17, 2024Updated last year
- A checklist of practices for organizations dealing with account takeover (ATO)☆276Oct 4, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,788Updated this week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Azure Security Resources and Notes☆1,717Feb 17, 2026Updated last month
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆608Nov 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Multi-Cloud Security Auditing Tool☆7,585Sep 23, 2025Updated 6 months ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- ☆576Jul 12, 2025Updated 8 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 4 months ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆340Apr 28, 2022Updated 3 years ago
- A curated list of awesome Kubernetes security resources☆957Dec 15, 2023Updated 2 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,197Updated this week
- GitHub App to set and enforce security policies☆1,399Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scans every git push to your Github organisations to find unwanted secrets.☆87May 1, 2025Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆902Sep 21, 2022Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year