YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection
☆102Jan 6, 2026Updated 2 months ago
Alternatives and similar repositories for yes3-scanner
Users that are interested in yes3-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated 11 months ago
- ☆18Feb 2, 2026Updated last month
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆64Aug 17, 2025Updated 7 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆76May 27, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆121Dec 9, 2025Updated 3 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆40Dec 5, 2025Updated 3 months ago
- An AWS IAM Privilege Escalation Path Library☆123Mar 16, 2026Updated last week
- AWS SSO Reporter☆55May 7, 2025Updated 10 months ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- ☆49Apr 9, 2025Updated 11 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- Convert JSON IAM Policies to other formats☆26Mar 14, 2026Updated last week
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- The dependency-check repository has moved:☆46Sep 27, 2025Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- ☆28Dec 26, 2025Updated 2 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Multithreaded spraying of a password on all accounts of a domain.☆27Feb 11, 2025Updated last year
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated 2 months ago
- ☆33Mar 7, 2026Updated 2 weeks ago
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Sep 30, 2023Updated 2 years ago
- ☆13May 27, 2021Updated 4 years ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆472Feb 14, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆142Nov 21, 2025Updated 4 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago