FogSecurity / finders-keypers
Finders Keypers: AWS KMS Key Usage Finder
☆26Updated 4 months ago
Alternatives and similar repositories for finders-keypers:
Users that are interested in finders-keypers are comparing it to the libraries listed below
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated last month
- ☆38Updated 4 months ago
- Generates runbooks for GuardDuty findings☆35Updated 9 months ago
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Scripts to quickly fix security and compliance issues☆26Updated last year
- ☆29Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆142Updated 4 months ago
- ☆114Updated last week
- AWS SSO Reporter☆54Updated last year
- A collection of documented and undocumented AWS API models☆32Updated 4 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆99Updated 4 months ago
- A toolset to juggle AWS roles for persistent access☆54Updated 7 months ago
- AWS honey token manager☆87Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆74Updated 3 weeks ago
- ☆43Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 4 months ago
- An AWS IAM policy statement parser and query tool.☆175Updated last year
- ☆29Updated 4 months ago
- ☆47Updated 5 months ago
- https://breaches.cloud☆38Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆45Updated 2 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 3 weeks ago
- ☆41Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆142Updated 2 weeks ago
- Repository to archive AWS Documentation for local use☆43Updated 5 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆158Updated 2 weeks ago