ankane / s3tk
A security toolkit for Amazon S3
☆458Updated 6 months ago
Alternatives and similar repositories for s3tk:
Users that are interested in s3tk are comparing it to the libraries listed below
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆640Updated 3 years ago
- AWS Security Tools (AST) in a simple Docker container.☆287Updated 3 years ago
- AWS Auditing & Hardening Tool☆711Updated 5 years ago
- A cli tool for importing and exporting AWS IAM configuration to YAML files☆243Updated 2 years ago
- CLI tool for auditing S3 buckets☆107Updated last year
- Antivirus for Amazon S3☆531Updated last year
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆895Updated 3 years ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆278Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆221Updated 4 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Updated 2 years ago
- Terraform module for creating alarms for tracking important changes and occurrences from cloudtrail.☆203Updated 3 months ago
- DEPRECATED — assume-role: a CLI tool making it easy to assume IAM roles through an AWS Bastion account☆425Updated 5 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆476Updated 5 months ago
- AWS Inventory in a single HTML file using JS AWS-SDK & Bootstrap☆390Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Updated last year
- Visualize your aws security groups.☆711Updated last week
- The Snapshot Tool for Amazon RDS automates the task of creating manual snapshots, copying them into a different account and a different r…☆344Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆438Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆543Updated 3 months ago
- AWS Baseline to roll out into your Organization☆133Updated 4 years ago
- Discover resources created in an AWS account.☆718Updated last year
- Blazing CloudTrail since 2018☆136Updated 6 years ago
- A number of Recipes for AWS☆194Updated 5 years ago
- Enforce ownership and data security within AWS☆449Updated 4 years ago
- Make a network graph of an AWS region☆84Updated 5 years ago
- Easily rotate your AWS access key.☆384Updated 6 months ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆294Updated 9 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆909Updated 5 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- A honey token manager and alert system for AWS.☆319Updated 3 years ago