5 talks mention this tool across 5 BSides chapters.
Open-source tool that analyzes cloud environments to identify attack pathways and privilege escalation opportunities available to attackers