Selefra is an open-source policy-as-code software that provides analysis for multi-cloud and SaaS environments, including over 30 services such as AWS, GCP, Azure, Alibaba Cloud, Kubernetes, Github, Cloudflare, and Slack. It allows users to engage in conversations with GPT models for security, cost, and architecture checks, enabling better cloud resource management, enhanced security, cost reduction, and optimized architecture design. Custom analysis policies can be written using SQL and YAML, and it offers unified multi-cloud configuration data integration capabilities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Tool for assessing compliance and running vulnerability scans on Docker images.
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
A framework to analyze container images and gather useful information.
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.