Visual IAM attack graph for AWS. Instantly analyze permissions, detect privilege-escalation risks, and audit IAM roles — locally, securely.
-
Updated
Dec 18, 2025 - Python
Visual IAM attack graph for AWS. Instantly analyze permissions, detect privilege-escalation risks, and audit IAM roles — locally, securely.
Automated cloud-security detection and response framework for adaptive defense across AWS environments.
Local-first AWS security auditor CLI that scans S3, EC2, IAM & RDS, maps findings to CIS/SOC2/HIPAA, and generates HTML reports with remediation commands.
Cloud security audit tools for AI agents — AWS, Azure, GCP misconfiguration detection via MCP. 38 tools, 60+ checks. The agent finds vulns, not you.
CIEM (Cloud Infrastructure Entitlement Management) platform for Zero Trust IAM - Excessive permissions detection, least-privilege scoring, and entitlement risk analysis
Hybrid architecture for Tally backup and NAS modernization using Amazon S3 (Intelligent-Tiering), Amazon FSx for Windows, IPSec VPN connectivity, and encrypted offsite backups with monitoring via SNS.
A curated list of cloud security tools for AWS, Azure, GCP, and Kubernetes
Schema-driven awesome list of cloud security guardrails powering cloudguardrail.com/tools
Serverless, event-driven AI news pipeline using Amazon Bedrock (Llama 3.2), Lambda, S3, and SNS. Delivers daily financial briefings with a focus on Least-Privilege IAM security and automated data governance.
Hands-on AWS security lab investigating a simulated cloud breach through CloudTrail log analysis. Traces complete attack chain from compromised IAM credentials through privilege escalation to S3 data exfiltration. Demonstrates forensic analysis, IAM security, and incident response techniques.
OSINT-based threat intelligence assessment analyzing phishing, brand impersonation, and identity-centric risks affecting an IAM provider.
AI-powered cloud security policy analyzer that detects IAM misconfigurations, policy conflicts, and attack paths using graph reasoning.
How to accidentally hack into AWS through IAM misconfigurations
Practical incident response playbooks for cloud, IAM, Kubernetes, and data exposure scenarios.
Securely backup Tally data with encrypted offsite storage, hybrid connectivity, and scalable file storage using AWS FSx and automated monitoring.
Add a description, image, and links to the iam-security topic page so that developers can more easily learn about it.
To associate your repository with the iam-security topic, visit your repo's landing page and select "manage topics."