Sweet is a cloud runtime security platform that utilizes eBPF-based sensors to monitor cloud infrastructure. The platform performs the following functions: - Establishes organizational baseline behavior for cloud infrastructure - Provides runtime monitoring and anomaly detection - Detects zero-day cloud attacks in real-time - Generates actionable attack narratives - Monitors cloud workload behavior - Delivers runtime insights for cloud security operations The solution implements dynamic profiling to identify runtime anomalies and assess active cloud risks. The eBPF-based architecture is designed to minimize performance impact while maintaining monitoring capabilities.
FEATURES
SIMILAR TOOLS
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
CloudSploit by Aqua is an open-source multi-cloud security scanning tool that detects security risks and compliance issues across AWS, Azure, GCP, OCI, and GitHub platforms.
Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.
HAWK is a multi-cloud antivirus scanning API that uses CLAMAV and YARA engines to detect malware in AWS S3, Azure Blob Storage, and GCP Cloud Storage objects.
A command-line security auditing tool that performs Lynis-based security assessments across AWS, GCP, Azure, and DigitalOcean cloud platforms.
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.