all paths lead to clouds
☆639Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for gitoops
Users that are interested in gitoops are comparing it to the libraries listed below
Sorting:
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆726Jun 29, 2022Updated 3 years ago
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- OWASP Domain Protect - prevent subdomain takeover☆399Dec 23, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆995Oct 4, 2022Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆733Sep 17, 2025Updated 5 months ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆276Oct 4, 2024Updated last year
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆908Dec 17, 2024Updated last year
- A collection of scripts for assessing Microsoft Azure security☆2,309Oct 29, 2025Updated 4 months ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Feb 3, 2025Updated last year
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆340Apr 28, 2022Updated 3 years ago
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆606Nov 28, 2024Updated last year
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,737Updated this week
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,185Updated this week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Multi-Cloud Security Auditing Tool☆7,562Sep 23, 2025Updated 5 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 7 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- Scans every git push to your Github organisations to find unwanted secrets.☆87May 1, 2025Updated 10 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- ☆576Jul 12, 2025Updated 7 months ago
- GitHub App to set and enforce security policies☆1,392Updated this week
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated last month