SherifTalaat / AWS-SG-AnalyzerLinks
Python script to analyze and extract all Security Groups information
☆44Updated 2 months ago
Alternatives and similar repositories for AWS-SG-Analyzer
Users that are interested in AWS-SG-Analyzer are comparing it to the libraries listed below
Sorting:
- Configure and deploy AWS Security Hub.☆16Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated last month
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆65Updated 9 months ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- ☆41Updated last month
- KYE: Know Your Enemies - Check external access on your AWS account☆124Updated 4 months ago
- Kubernetes Stranger Danger☆64Updated last month
- ☆42Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated 2 weeks ago
- A collection of Terraform projects for a wide range of scenarios and tasks☆13Updated 2 weeks ago
- Examples of various Entra ID scenarios in Terraform☆17Updated 11 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 7 months ago
- ☆46Updated 9 months ago
- A command-line tool to perform Local Health Check Probes inside Container Images (ECS, Docker)☆51Updated 3 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆42Updated this week
- In-depth and hands-on practice for acing the exam.☆15Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- TODO: Funny pun about visibility☆226Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 11 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Crowdsourced list of sensitive IAM Actions☆153Updated 9 months ago
- Public repository of all things cloud security.☆43Updated 11 months ago
- ☆30Updated 4 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆176Updated 3 months ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆98Updated 2 months ago
- https://breaches.cloud☆42Updated 10 months ago
- ☆21Updated 3 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 7 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 10 months ago
- ☆32Updated last year