A list of cloud security tools and vendors.
☆186Sep 6, 2024Updated last year
Alternatives and similar repositories for cloud-security-list
Users that are interested in cloud-security-list are comparing it to the libraries listed below
Sorting:
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Terraform wrapper script for handling multi-environment, multi-region deployments☆11Jul 5, 2016Updated 9 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 2 months ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 3 months ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,035Feb 9, 2026Updated 3 weeks ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Jul 3, 2018Updated 7 years ago
- ☆10Aug 9, 2024Updated last year
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆648Feb 24, 2026Updated last week
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆56Dec 11, 2025Updated 2 months ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Feb 25, 2026Updated last week
- An SBOM query language and associated utilities☆55Jan 22, 2024Updated 2 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources☆17Jan 20, 2026Updated last month
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆59Jan 5, 2024Updated 2 years ago
- A minimalist and lightweight starter kit that that utilises Pico for beautiful plug-and-play landing page UI blocks.☆16Updated this week
- A reusable workflow to show how to orchestrate many iterations of an action concurrently, in a single pane of glass. See medium write-up …☆12Nov 8, 2024Updated last year
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- ☆13Dec 16, 2022Updated 3 years ago
- Infrastructure developer tools includes set of plugins and services that make it easier than ever to build, test and deploy infrastructur…☆13Mar 23, 2021Updated 4 years ago
- This repository contains a tool which traces syscalls in a fast way using eBPF linux kernel feature☆16Jun 30, 2017Updated 8 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Documenting SOC 2 tools and processes☆100Jan 19, 2022Updated 4 years ago
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆153Feb 9, 2026Updated 3 weeks ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable supp…☆19Feb 23, 2026Updated last week
- ☆13Feb 17, 2024Updated 2 years ago
- Assume cross-account AWS IAM roles for sub commands☆12Oct 22, 2016Updated 9 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 9 months ago
- The repo contains the source code for various GCP related tutorials.☆37Sep 13, 2023Updated 2 years ago
- Open Source Cloud Security☆727Oct 26, 2023Updated 2 years ago
- Compliance automation framework, focused on SOC2☆1,493Jul 21, 2022Updated 3 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Fleet Management Simulator using Consul, Nomad, Vault, Terraform, Packer and Go☆18Feb 4, 2020Updated 6 years ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- Complete CNAPP Demo using Prisma Cloud☆18Mar 26, 2025Updated 11 months ago