CloudTracker is an IAM analysis tool that identifies over-privileged users and roles in AWS environments by comparing actual usage patterns from CloudTrail logs against current IAM policies. The tool analyzes CloudTrail activity logs to determine which permissions are actually being used by IAM entities, then compares this usage data with the permissions granted in their current policies. This comparison helps identify permissions that are granted but never used, indicating potential over-privileging. CloudTracker requires setup of a virtual environment and installation via package manager. Users must download IAM data using AWS CLI and configure the tool with a configuration file to specify analysis parameters. The tool provides insights into IAM permission usage patterns, helping security teams identify opportunities to implement least privilege access by removing unused permissions from IAM policies.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
A list of Windows privilege escalation techniques, categorized and explained in detail.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
A list of disposable email domains to detect or block disposable accounts
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.