Chan9390 / aws-mfa-enforceLinks
Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Console.
☆13Updated 6 years ago
Alternatives and similar repositories for aws-mfa-enforce
Users that are interested in aws-mfa-enforce are comparing it to the libraries listed below
Sorting:
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Metasploit Framework☆25Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- ☆25Updated 4 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- ☆25Updated 10 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Collection of information security policies.☆29Updated 8 years ago