IamLucif3r / AWS-Key-HunterLinks
[Just for fun] Find exposed AWS keys (VALID KEYS ONLY) on github
☆39Updated 4 months ago
Alternatives and similar repositories for AWS-Key-Hunter
Users that are interested in AWS-Key-Hunter are comparing it to the libraries listed below
Sorting:
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆98Updated 3 months ago
- cloudgrep is grep for cloud storage☆325Updated 8 months ago
- Public repository of all things cloud security.☆45Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 10 months ago
- An AWS IAM policy statement parser and query tool.☆195Updated 4 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆115Updated 6 months ago
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated last year
- find dangling domains in a multi cloud environment☆173Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated this week
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆30Updated 3 months ago
- Holds the public Hacking the Cloud CTFs.☆60Updated last year
- An open-source collection of API key rotation tutorials.☆74Updated 2 months ago
- AWS honey token manager☆89Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆127Updated 7 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- Generate datasets of cloud audit logs for common attacks☆224Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- Curated list of security tools☆68Updated last year
- APIsec|SCAN - Free API security testing using Github actions☆102Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆405Updated 2 months ago
- Awesome list for cloud security related projects☆140Updated 3 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆174Updated last week
- AWS Attack Path Management Tool - Walking on the Moon☆260Updated 11 months ago
- Scan publicly accessible assets on your AWS cloud environment☆136Updated 5 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated this week
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆102Updated 5 months ago