Sytten / awesome-aws-iam
A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources
☆17Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-aws-iam
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆18Updated 3 years ago
- This is a custom SSM agent which is sorta functional☆16Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆23Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- ☆14Updated last year
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆15Updated 5 years ago
- List of special metadata IPs used in cloud services☆11Updated 5 years ago
- AWS S3 Sensitive Data Search☆35Updated 2 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- ☆10Updated 5 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- Burp Extension for AWS Signing☆86Updated last month
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated last week