Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder
☆45Aug 13, 2025Updated 7 months ago
Alternatives and similar repositories for finders-keypers
Users that are interested in finders-keypers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- Convert JSON IAM Policies to other formats☆26Mar 14, 2026Updated last week
- Google Maps for AWS IAM☆271Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated 2 weeks ago
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Expand IAM Actions with Wildcards☆35Mar 14, 2026Updated last week
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated 3 weeks ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Mar 16, 2026Updated last week
- ☆23Feb 20, 2023Updated 3 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- ☆38Jun 9, 2021Updated 4 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated 3 months ago
- A typesafe CLI argument parser and help content generator.☆16Mar 14, 2026Updated last week
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- Repo For Finding the unused aws resources, using the Unused Resources Package from PyPI in Lambda/ECS or using the code directly in Lamb…☆12Oct 7, 2020Updated 5 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- ☆12Sep 12, 2021Updated 4 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 6 months ago
- Collection of incidents resulting from caching issues☆29Jun 3, 2025Updated 9 months ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- ☆229Mar 10, 2026Updated 2 weeks ago