SherifTalaat / AWS-SG-AnalyzerLinks
Python script to analyze and extract all Security Groups information
☆45Updated 6 months ago
Alternatives and similar repositories for AWS-SG-Analyzer
Users that are interested in AWS-SG-Analyzer are comparing it to the libraries listed below
Sorting:
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆68Updated last year
- ☆41Updated 5 months ago
- Examples of various Entra ID scenarios in Terraform☆17Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 5 months ago
- Configure and deploy AWS Security Hub.☆16Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated 4 months ago
- ☆42Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆83Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 8 months ago
- ☆47Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated 3 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆103Updated 6 months ago
- ☆28Updated 7 months ago
- https://breaches.cloud☆42Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- Crowdsourced list of sensitive IAM Actions☆157Updated last year
- Generates runbooks for GuardDuty findings☆39Updated last year
- An AWS IAM policy statement parser and query tool.☆196Updated 6 months ago
- AWS honey token manager☆89Updated last year
- ☆30Updated 8 months ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆114Updated 3 months ago
- A toolset to juggle AWS roles for persistent access☆59Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Updated 4 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Updated 5 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- ☆35Updated 2 months ago