Google Maps for AWS IAM
☆263Feb 25, 2026Updated last week
Alternatives and similar repositories for iam-lens
Users that are interested in iam-lens are comparing it to the libraries listed below
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- Daily Updates of AWS IAM Data☆22Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Feb 25, 2026Updated last week
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated last week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Feb 25, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Convert JSON IAM Policies to other formats☆25Updated this week
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 2 months ago
- List of known AWS accounts☆257Feb 6, 2026Updated 3 weeks ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- An AWS IAM Privilege Escalation Path Library☆120Feb 23, 2026Updated last week
- AWS Trustline: Check external access on your AWS account☆129Updated this week
- ☆43Jul 17, 2025Updated 7 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆14Jan 5, 2026Updated last month
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Scan your account for the use of untrusted AMIs☆31Feb 13, 2026Updated 2 weeks ago
- AI Assistant for your GitHub issues. 🤖☆13Jan 25, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 7 months ago
- ☆23Mar 4, 2025Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- A tool to show what AWS account and identity you're using.☆56Oct 20, 2023Updated 2 years ago
- ☆124May 26, 2025Updated 9 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Generate Steampipe AWS config files for an AWS Organization☆14Aug 18, 2025Updated 6 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year