SherifTalaat / AWS-SG-AnalyzerLinks
Python script to analyze and extract all Security Groups information
☆44Updated 3 weeks ago
Alternatives and similar repositories for AWS-SG-Analyzer
Users that are interested in AWS-SG-Analyzer are comparing it to the libraries listed below
Sorting:
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated last week
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆65Updated 8 months ago
- ☆41Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆106Updated 6 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 10 months ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆89Updated 3 weeks ago
- KYE: Know Your Enemies - Check external access on your AWS account☆121Updated 2 months ago
- ☆42Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆36Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 3 weeks ago
- ☆32Updated last year
- Crowdsourced list of sensitive IAM Actions☆152Updated 8 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆51Updated 2 months ago
- Generates runbooks for GuardDuty findings☆36Updated last year
- ☆46Updated 8 months ago
- Kubernetes audit logging, when you don't control the control plane☆82Updated this week
- TODO: Funny pun about visibility☆205Updated last week
- AWS SSO Reporter☆54Updated 2 months ago
- https://breaches.cloud☆41Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 5 months ago
- Kubernetes Stranger Danger☆62Updated this week
- An AWS IAM policy statement parser and query tool.☆189Updated 3 weeks ago
- Terraform modules for an EC2 Image Builder Pipeline with an Amazon Linux 2 Baseline Container Recipe, which is used to deploy a Docker ba…☆42Updated 2 years ago
- Examples of various Entra ID scenarios in Terraform☆16Updated 9 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆67Updated last week
- Labs for Threat Modelling training delivered by ControlPlane☆33Updated last year