benbridts / aws-undocumented-api-models
Model files for undocumented AWS APIs
☆13Updated 10 months ago
Alternatives and similar repositories for aws-undocumented-api-models
Users that are interested in aws-undocumented-api-models are comparing it to the libraries listed below
Sorting:
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- A toolset to juggle AWS roles for persistent access☆57Updated 9 months ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- ☆22Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- Repository to archive GCP Documentation for local use☆15Updated 3 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 2 months ago
- ☆33Updated 2 years ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆40Updated 6 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆15Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- ☆12Updated 6 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- This is a custom SSM agent which is sorta functional☆17Updated 3 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- AWS managed IAM policies☆16Updated 3 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated this week
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- ☆29Updated 6 months ago