TinderSec / oidc-scanner-aws
☆45Updated last year
Related projects: ⓘ
- AWS honey token manager☆78Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆56Updated last year
- find dangling domains in a multi cloud environment☆133Updated 4 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆42Updated 8 months ago
- A collection of documented and undocumented AWS API models☆21Updated last week
- AWS SSO Reporter☆54Updated last year
- A Golang program to rotate AWS & GCP account keys☆63Updated last week
- ☆108Updated last month
- Crowdsourced list of sensitive IAM Actions☆132Updated last week
- ☆144Updated this week
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 8 months ago
- ☆33Updated 2 months ago
- ☆100Updated 3 weeks ago
- Clean accounts over permissions in GCP infra at scale☆70Updated last year
- Protect against subdomain takeover☆92Updated 3 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated 11 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆42Updated 4 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆72Updated 7 months ago
- List of known AWS accounts☆157Updated 3 weeks ago
- An AWS IAM policy statement parser and query tool.☆153Updated 7 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 3 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆91Updated 3 weeks ago
- AWS Attack Path Management Tool - Walking on the Moon☆187Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆68Updated 3 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆60Updated 3 months ago
- ☆134Updated last week
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆94Updated 2 years ago
- ☆190Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆122Updated 3 months ago