Netflix-Skunkworks / aws-credential-compromise-detection
Example detection of compromise credentials in AWS
☆119Updated 6 years ago
Alternatives and similar repositories for aws-credential-compromise-detection:
Users that are interested in aws-credential-compromise-detection are comparing it to the libraries listed below
- Blazing CloudTrail since 2018☆134Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆56Updated 5 years ago
- ☆82Updated 5 years ago
- ☆151Updated last year
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- AWS Inventory and Compliance Framework☆223Updated last year
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Updated last year
- A small lambda script that will disable access keys older than a given amount of days.☆151Updated last year
- Resource types that can be publicly exposed on AWS☆319Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆62Updated 5 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆104Updated 3 years ago
- AWS docs, guides, and other tools☆76Updated last year
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆45Updated 10 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Updated last year
- for AWS Security material☆246Updated 2 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 2 years ago
- The original AWS security enforcer™☆59Updated 5 years ago
- Github action for linting AWS IAM policy documents☆36Updated last year
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated last year
- Assess certain AWS network configurations☆11Updated 6 years ago
- Remote Memory Acquisition Tool☆244Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆222Updated 4 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 8 months ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆90Updated 5 years ago
- Cloud Custodian Policies for Automated Amazon Resource Management☆59Updated 5 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Tools for AWS forensics☆64Updated 8 years ago
- Demonstrates sending AWS findings to your Slack Channel☆56Updated last year