A tool for quickly evaluating IAM permissions in AWS.
☆76May 27, 2024Updated last year
Alternatives and similar repositories for PMapper
Users that are interested in PMapper are comparing it to the libraries listed below
Sorting:
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆229Mar 10, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 2 months ago
- Expand IAM Actions with Wildcards☆35Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- ☆71Jan 8, 2025Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- ☆36May 31, 2024Updated last year
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,195Mar 4, 2026Updated 2 weeks ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- Terraform module for OWASP Domain Protect on AWS☆15Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- ☆14Mar 6, 2023Updated 3 years ago
- A crowdsourced AWS IAM permissions reference.☆102Feb 2, 2026Updated last month
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆287Mar 13, 2026Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Terraform Provider for Digital Rebar Provision☆20Oct 20, 2023Updated 2 years ago
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated 2 months ago
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆302Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,309Mar 10, 2026Updated last week
- cloudgrep is grep for cloud storage☆326Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆437Feb 16, 2026Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago