IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)
☆98Sep 14, 2022Updated 3 years ago
Alternatives and similar repositories for IAM-Deescalate
Users that are interested in IAM-Deescalate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆566Mar 12, 2026Updated last month
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆115Jan 2, 2025Updated last year
- ☆35Jan 27, 2023Updated 3 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- ☆124Updated this week
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,205Updated this week
- ☆159Jul 8, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 9 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆602Apr 8, 2026Updated 3 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆25Jan 17, 2023Updated 3 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- A toolset to juggle AWS roles for persistent access☆64Aug 14, 2024Updated last year
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆163Apr 22, 2021Updated 5 years ago
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated last month
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 26, 2026Updated last week
- A recorder of AWS API calls for Lambda functions☆15Sep 15, 2020Updated 5 years ago
- ☆31Oct 28, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,304Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- AWS SSO Reporter☆55May 7, 2025Updated last year
- ☆231Mar 27, 2026Updated last month
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆274Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Apr 15, 2026Updated 3 weeks ago
- A command-line tool to get valuable information out of AWS CloudTrail☆833Apr 27, 2026Updated last week
- Expand IAM Actions with Wildcards☆35Updated this week
- Tracker for Encryption by Default for AWS Resources☆14Apr 10, 2025Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Apr 13, 2026Updated 3 weeks ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆1,005Oct 4, 2022Updated 3 years ago
- Generate datasets of cloud audit logs for common attacks☆237Apr 26, 2026Updated last week