Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder
☆46Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for finders-keypers
Users that are interested in finders-keypers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆62Feb 5, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Apr 26, 2026Updated last week
- ☆46Nov 7, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆87Apr 27, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Apr 26, 2026Updated last week
- Convert JSON IAM Policies to other formats☆26Apr 26, 2026Updated last week
- Google Maps for AWS IAM☆272Updated this week
- Daily Updates of AWS IAM Data☆24Updated this week
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated last month
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- Expand IAM Actions with Wildcards☆34Apr 26, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Updated this week
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Apr 27, 2026Updated last week
- ☆23Feb 20, 2023Updated 3 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆22Oct 2, 2024Updated last year
- ☆38Jun 9, 2021Updated 4 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated 2 weeks ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆183Dec 21, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 2 months ago
- List of known AWS accounts☆257Apr 2, 2026Updated last month
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆82Jul 25, 2025Updated 9 months ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Repo For Finding the unused aws resources, using the Unused Resources Package from PyPI in Lambda/ECS or using the code directly in Lamb…☆12Oct 7, 2020Updated 5 years ago
- A repo to demonstrate a complete Terraform Demo☆13Jun 11, 2024Updated last year
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Apr 16, 2026Updated 2 weeks ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- Collection of incidents resulting from caching issues☆29Jun 3, 2025Updated 11 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- ☆231Mar 27, 2026Updated last month