Cloud Sniper Logo

Cloud Sniper

0
Free
Visit Website

Cloud Sniper is a comprehensive platform meticulously designed to streamline Cloud Security Operations. It swiftly responds to security incidents by analyzing and correlating cloud artifacts, ensuring a holistic view of the company's cloud security posture. Serving as a centralized Incident and Response hub, our platform executes automatic actions, leveraging cloud native artifacts and open-source technologies. Efficiently processing security feeds, Cloud Sniper autonomously safeguards the cloud infrastructure. Its Analytics module correlates Indicators of Compromise (IOCs) to unveil attacker tactics, techniques, and procedures (TTPs), furnishing analysts with enhanced security findings. Users access a comprehensive incident management system through Cloud Sniper. Advanced security analysts seamlessly integrate external forensic or incident-and-response tools to ingest new security feeds. The platform deploys and integrates with native cloud resources in a fully modularized manner, facilitating easy extension by the community.

FEATURES

ALTERNATIVES

A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies

Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.

A script and library for identifying risks in AWS IAM configuration

Implements a cloud version of the Shadow Copy attack against domain controllers in AWS, allowing theft of domain user hashes.

Find exposed AWS cloud assets that you did not know you had.

A Terraform module to set up a secure AWS account configuration baseline

A multi-threaded AWS security-focused inventory collection tool with comprehensive resource coverage and efficient data collection methods.

Generate Amazon GuardDuty findings related to real AWS resources with multiple tests available.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved