SherifTalaat / AWS-SG-AnalyzerLinks
Python script to analyze and extract all Security Groups information
☆44Updated last month
Alternatives and similar repositories for AWS-SG-Analyzer
Users that are interested in AWS-SG-Analyzer are comparing it to the libraries listed below
Sorting:
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated last month
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆64Updated 8 months ago
- Configure and deploy AWS Security Hub.☆16Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆95Updated last month
- Examples of various Entra ID scenarios in Terraform☆17Updated 10 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 11 months ago
- Kubernetes Stranger Danger☆63Updated 3 weeks ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated this week
- CloudSplaining on AWS Managed Policies☆44Updated this week
- ☆41Updated 2 weeks ago
- ☆46Updated 8 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆124Updated 3 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- ☆42Updated last year
- A collection of Terraform projects for a wide range of scenarios and tasks☆11Updated 2 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆40Updated this week
- ☆31Updated 4 months ago
- https://breaches.cloud☆41Updated 9 months ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆73Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 7 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago
- TODO: Funny pun about visibility☆222Updated this week
- ☆32Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Public repository of all things cloud security.☆43Updated 10 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Generates runbooks for GuardDuty findings☆36Updated last year
- An AWS IAM policy statement parser and query tool.☆192Updated last month
- Crowdsourced list of sensitive IAM Actions☆152Updated 9 months ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆146Updated this week