abbbi / ssenvLinks
Exit if environment variables known to be used as access tokens are set.
☆15Updated 3 years ago
Alternatives and similar repositories for ssenv
Users that are interested in ssenv are comparing it to the libraries listed below
Sorting:
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆44Updated 3 weeks ago
- Automated determination of which AWS services run where☆20Updated last week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated last week
- A Golang program to rotate AWS & GCP account keys☆66Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- Intercepts and filters requests to the EC2 Instance Metadata Service☆71Updated 4 years ago
- ☆55Updated last week
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 4 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆58Updated last year
- ☆49Updated 2 years ago
- build distroless images with alpine tools☆131Updated 3 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- An access-limiting stateless GitHub API Proxy☆149Updated 2 years ago
- Collection of incidents resulting from caching issues☆30Updated 2 months ago
- An SBOM query language and associated utilities☆54Updated last year
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- Security Alert Decoration☆27Updated 2 weeks ago
- ☆25Updated last year
- Collect IAM information from all your AWS organization, accounts, and resources.☆39Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Look up region and other information for any AWS IP address☆90Updated 2 years ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆87Updated this week
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42Updated 2 years ago