TinderSec / oidc-scanner-awsLinks
☆49Updated 2 years ago
Alternatives and similar repositories for oidc-scanner-aws
Users that are interested in oidc-scanner-aws are comparing it to the libraries listed below
Sorting:
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆90Updated this week
- find dangling domains in a multi cloud environment☆142Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- AWS honey token manager☆87Updated last year
- A collection of documented and undocumented AWS API models☆36Updated 8 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆110Updated 3 months ago
- Scalable integrity framework for ABAC on AWS☆55Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- AWS SSO Reporter☆54Updated 2 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆44Updated 2 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- List of known AWS accounts☆219Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆58Updated last year
- Safer AWS SCP deployments via real-time monitoring☆54Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 6 months ago
- An AWS metadata enumeration tool by Plerion☆96Updated last year
- ☆48Updated 9 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆124Updated 3 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆152Updated 9 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated 3 weeks ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆163Updated 3 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆42Updated last week
- AWS Attack Path Management Tool - Walking on the Moon☆254Updated 7 months ago
- ☆220Updated last month
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated 6 months ago