Example detection of compromise credentials in AWS
☆122Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for aws-credential-compromise-detection
Users that are interested in aws-credential-compromise-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆83Dec 5, 2019Updated 6 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆910Dec 17, 2021Updated 4 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Jan 23, 2026Updated 2 months ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 7 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 5 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆79Jan 26, 2023Updated 3 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆831Mar 23, 2026Updated last week
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆483Oct 25, 2024Updated last year
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- The open source version of the Amazon GuardDuty documentation. You can provide feedback & requests for changes by submitting issues in th…☆22Jun 15, 2023Updated 2 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Diffs for structured data☆16Dec 26, 2018Updated 7 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆634Jan 14, 2026Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple library to generate IAM policy statements with no need to remember all the actions APIs☆154May 20, 2023Updated 2 years ago
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,000Oct 4, 2022Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- ☆25Dec 10, 2018Updated 7 years ago