RyPeck / aws_managed_policiesView external linksLinks
AWS managed IAM policies
☆16Mar 24, 2022Updated 3 years ago
Alternatives and similar repositories for aws_managed_policies
Users that are interested in aws_managed_policies are comparing it to the libraries listed below
Sorting:
- Remove EXIF data from all objects in an S3 bucket☆16Mar 16, 2021Updated 4 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- Start building devices to connect to the Hubble Network☆14Updated this week
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 2 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆87Sep 11, 2023Updated 2 years ago
- AWS managed IAM policies☆128Dec 6, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- LittleSnitch Log Statistics Exporter☆35Apr 16, 2023Updated 2 years ago
- Command line tool for working with Panther rules and policies☆48Updated this week
- ☆157Jul 8, 2023Updated 2 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 4 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- Deploy Backup and DR appliances☆12Jan 29, 2026Updated 2 weeks ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Command line interface application which uses on-device RSA keys (through OpenSC and PKCS#11) to encrypt/decrypt AES key used in turn to…☆33Jul 9, 2019Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week
- List of AWS Services and Actions☆45Jul 15, 2025Updated 6 months ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆298Jan 23, 2026Updated 3 weeks ago
- Install your remote server for the Lamassu Cryptomat☆18Jan 7, 2026Updated last month
- ☆14Aug 5, 2024Updated last year
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Ansible role to install Nix☆12Updated this week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- video segment identification system☆14Oct 31, 2021Updated 4 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆20Updated this week
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Install and configure tailscale on your system.☆12Dec 17, 2025Updated last month