SummitRoute / imdsv2_wall_of_shameView external linksLinks
List of vendors that do not allow IMDSv2 enforcement
☆143May 3, 2024Updated last year
Alternatives and similar repositories for imdsv2_wall_of_shame
Users that are interested in imdsv2_wall_of_shame are comparing it to the libraries listed below
Sorting:
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- List of known AWS accounts☆252Feb 6, 2026Updated last week
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 3 years ago
- (Unofficial) AWS CloudShell plugin for VS Code☆56May 22, 2025Updated 8 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- AWS CloudSaga - Simulate security events in AWS☆472Updated this week
- ☆228Jan 29, 2026Updated 2 weeks ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year
- Resource types that can be publicly exposed on AWS☆329Feb 23, 2022Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 5 months ago
- AWS IAM linting library☆1,109Jan 7, 2026Updated last month
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- ☆157Jul 8, 2023Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- Builds a tree view of parameters from AWS System Manager Parameter Store☆67Feb 13, 2024Updated 2 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- AWS managed IAM policies☆128Dec 6, 2021Updated 4 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆124May 26, 2025Updated 8 months ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,180Updated this week
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,115Dec 12, 2025Updated 2 months ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆69Dec 30, 2019Updated 6 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- ☆374Feb 23, 2024Updated last year
- ☆52Oct 27, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 7 months ago
- ☆35Jan 27, 2023Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 3 months ago
- ☆142Nov 24, 2025Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago