AlfrescoArchive / sweeperLinks
A tool to check for rogue/orphaned AWS services running that cost money
☆14Updated 7 years ago
Alternatives and similar repositories for sweeper
Users that are interested in sweeper are comparing it to the libraries listed below
Sorting:
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- A terraform module to install the prerequisites for cloud-custodian☆10Updated last year
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Updated 3 years ago
- Using Prowler to Automate Compliance Checks for AWS CIS Benchmarks☆9Updated 2 years ago
- ☆11Updated 7 years ago
- AWS Backup implementation in terraform☆14Updated 5 years ago
- Offensive Terraform Website☆45Updated 4 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Updated 3 years ago
- A lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is created☆15Updated 6 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- notes on configuring aws organizations☆11Updated 8 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- Dump your EC2 Security Groups as a CSV or JSON file☆71Updated 2 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Updated 5 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 3 years ago
- Manage your security groups using the API gateway and Lambda☆19Updated 8 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago