cloud-copilot / iam-simulate
An IAM Simulator that outputs detailed explains of how a request was evaluated.
☆69Updated this week
Alternatives and similar repositories for iam-simulate:
Users that are interested in iam-simulate are comparing it to the libraries listed below
- AWS honey token manager☆87Updated 6 months ago
- ☆47Updated last year
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 3 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- ☆47Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆72Updated 8 months ago
- Expand IAM Actions with Wildcards☆29Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆141Updated 3 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆116Updated 2 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆47Updated 3 months ago
- ☆42Updated last month
- ☆33Updated 2 years ago
- ☆157Updated 3 weeks ago
- A collection of documented and undocumented AWS API models☆32Updated 3 months ago
- ☆134Updated 3 weeks ago
- Repository to archive AWS Documentation for local use☆41Updated 4 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆93Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆137Updated last month
- ☆32Updated 6 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- Generate datasets of cloud audit logs for common attacks☆199Updated 6 months ago
- ☆26Updated 3 months ago