AWS Certified Security Specialty (2020) course notes
☆121Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for AWS-Certified-Security-Specialty
Users that are interested in AWS-Certified-Security-Specialty are comparing it to the libraries listed below
Sorting:
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Nov 19, 2020Updated 5 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆12Feb 27, 2026Updated last week
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- ☆23Feb 20, 2023Updated 3 years ago
- Security aspects of AWS products for the Security Specialist certification☆211May 12, 2022Updated 3 years ago
- A command line security audit tool for Amazon Web Services☆82Mar 4, 2019Updated 7 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆128Updated this week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Oct 8, 2021Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- A package that get baseball data☆13Feb 24, 2025Updated last year
- ☆15Oct 29, 2024Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆302Updated this week
- Monitor AWS Managed IAM Policies Changes☆495Updated this week
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43May 20, 2021Updated 4 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Mar 2, 2026Updated last week
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Orchestrates large Cloudformation deployments☆10Aug 19, 2022Updated 3 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago