Example detection of compromise credentials in AWS
☆122Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for aws-credential-compromise-detection
Users that are interested in aws-credential-compromise-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆83Dec 5, 2019Updated 6 years ago
- ☆376Feb 23, 2024Updated 2 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Jan 23, 2026Updated 2 months ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 7 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆449Jul 17, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This command line tool counts the number of resources in different categories across Amazon regions.☆58Dec 17, 2019Updated 6 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 5 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆79Jan 26, 2023Updated 3 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆833Updated this week
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 5 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆484Oct 25, 2024Updated last year
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- The open source version of the Amazon GuardDuty documentation. You can provide feedback & requests for changes by submitting issues in th…☆22Jun 15, 2023Updated 2 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Diffs for structured data☆16Dec 26, 2018Updated 7 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆634Jan 14, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- A simple library to generate IAM policy statements with no need to remember all the actions APIs☆154May 20, 2023Updated 2 years ago
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,002Oct 4, 2022Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago