ankane / s3tkLinks
A security toolkit for Amazon S3
☆461Updated 2 months ago
Alternatives and similar repositories for s3tk
Users that are interested in s3tk are comparing it to the libraries listed below
Sorting:
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆639Updated 4 years ago
- AWS Security Tools (AST) in a simple Docker container.☆285Updated 4 years ago
- AWS Auditing & Hardening Tool☆710Updated 5 years ago
- Antivirus for Amazon S3☆534Updated 2 years ago
- A cli tool for importing and exporting AWS IAM configuration to YAML files☆246Updated 2 years ago
- CLI tool for auditing S3 buckets☆107Updated 2 years ago
- Visualize your aws security groups.☆719Updated 5 months ago
- scan s3 buckets for security issues☆85Updated last year
- A small lambda script that will disable access keys older than a given amount of days.☆154Updated 2 years ago
- A number of Recipes for AWS☆192Updated 6 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Updated 5 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆480Updated 11 months ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 6 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Updated last year
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆443Updated 2 years ago
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆282Updated 4 years ago
- AWS Inventory in a single HTML file using JS AWS-SDK & Bootstrap☆388Updated 4 years ago
- Make a network graph of an AWS region☆86Updated 6 years ago
- Manage secrets on AWS instances with KMS encryption, IAM roles and S3 storage.☆90Updated 7 years ago
- A honey token manager and alert system for AWS.☆320Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆901Updated 3 years ago
- Lightweight SSH key management on AWS EC2☆223Updated 2 years ago
- Blazing CloudTrail since 2018☆138Updated 6 years ago
- 🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github☆90Updated 7 years ago
- Enforce ownership and data security within AWS☆446Updated 4 years ago
- Cloud Conformity Auto Remediate☆157Updated last month
- (Not maintained anymore) Watchmen - AWS account compliance using centrally managed Config Rules☆178Updated 7 years ago
- Monitor Host-Based Intrusion Detection System Alerts on Amazon EC2 Instances☆63Updated 2 years ago
- Iterate and exterminate an AWS Account☆73Updated 7 years ago