Fennerr / PMapperLinks
A tool for quickly evaluating IAM permissions in AWS.
☆73Updated last year
Alternatives and similar repositories for PMapper
Users that are interested in PMapper are comparing it to the libraries listed below
Sorting:
- AWS honey token manager☆87Updated 10 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆82Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆28Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 3 months ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- A collection of documented and undocumented AWS API models☆36Updated 7 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆44Updated last month
- ☆33Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆150Updated 7 months ago
- ☆48Updated 7 months ago
- Scripts to quickly fix security and compliance issues☆27Updated last year
- ☆22Updated 2 years ago
- ☆49Updated 2 years ago
- find dangling domains in a multi cloud environment☆142Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆41Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆47Updated 5 months ago
- An AWS metadata enumeration tool by Plerion☆96Updated last year
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆63Updated last week
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- AWS SSO Reporter☆54Updated last month
- AWS Attack Path Management Tool - Walking on the Moon☆253Updated 6 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆106Updated last month
- Scan publicly accessible assets on your AWS cloud environment☆138Updated this week
- ☆25Updated 2 months ago