PaloAltoNetworks / IAM-DeescalateView external linksLinks
IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)
☆98Sep 14, 2022Updated 3 years ago
Alternatives and similar repositories for IAM-Deescalate
Users that are interested in IAM-Deescalate are comparing it to the libraries listed below
Sorting:
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆544Sep 11, 2025Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆124May 26, 2025Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Jan 2, 2025Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,539Aug 2, 2024Updated last year
- Bare minimum AWS Security Alerting and Secure by default Configuration☆511May 15, 2025Updated 9 months ago
- Resource types that can be publicly exposed on AWS☆329Feb 23, 2022Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆590Nov 12, 2025Updated 3 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆228Jan 29, 2026Updated 2 weeks ago
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,180Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- Automated least-privilege enforcement for AWS IAM. Analyzes CloudTrail data to compute permission utilization metrics and generates polic…☆13Jan 12, 2026Updated last month
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- A toolset to juggle AWS roles for persistent access☆62Aug 14, 2024Updated last year
- A command-line tool to get valuable information out of AWS CloudTrail☆830Updated this week
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- A recorder of AWS API calls for Lambda functions☆15Sep 15, 2020Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- ☆31Oct 28, 2024Updated last year
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Feb 1, 2026Updated 2 weeks ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 2 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Sep 4, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Updated this week
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆162Apr 22, 2021Updated 4 years ago