Google Maps for AWS IAM
☆271Mar 19, 2026Updated this week
Alternatives and similar repositories for iam-lens
Users that are interested in iam-lens are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆88Updated this week
- Daily Updates of AWS IAM Data☆23Updated this week
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Mar 14, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- yams is a Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies☆35Feb 26, 2026Updated 3 weeks ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- ☆43Jul 17, 2025Updated 8 months ago
- Convert JSON IAM Policies to other formats☆26Mar 14, 2026Updated last week
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 3 months ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- An AWS IAM Privilege Escalation Path Library☆124Mar 16, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated 2 weeks ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Generate Steampipe AWS config files for an AWS Organization☆14Aug 18, 2025Updated 7 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆79Sep 16, 2025Updated 6 months ago
- cloudgrep is grep for cloud storage☆326Mar 14, 2026Updated last week
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- ☆124May 26, 2025Updated 9 months ago
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated last month
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Expand IAM Actions with Wildcards☆35Mar 14, 2026Updated last week
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated last month
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆374Dec 6, 2025Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year