This command line tool counts the number of resources in different categories across Amazon regions.
☆59Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for resource-counter
Users that are interested in resource-counter are comparing it to the libraries listed below
Sorting:
- A simple file-based scanner to look for potential AWS access and secret keys in files☆95Mar 18, 2024Updated last year
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- AWS IAM User Permissions☆20Sep 28, 2019Updated 6 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 2 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Discover resources created in an AWS account.☆735Apr 5, 2024Updated last year
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆640Apr 29, 2021Updated 4 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆907Dec 17, 2021Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆281Dec 12, 2020Updated 5 years ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 6 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Mar 25, 2021Updated 4 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆620Jan 16, 2020Updated 6 years ago
- WeirdAAL (AWS Attack Library)☆837Jan 13, 2025Updated last year
- ☆375Feb 23, 2024Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,541Aug 2, 2024Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Aug 9, 2019Updated 6 years ago
- AWS S3 file explorer on CLI☆11May 3, 2019Updated 6 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆30Jan 14, 2026Updated last month
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- A simple library to generate IAM policy statements with no need to remember all the actions APIs☆154May 20, 2023Updated 2 years ago
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆274Jun 12, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- GitOps for Teams (experimental hard fork of atlantis)☆14Oct 24, 2019Updated 6 years ago
- Python script for AWS resources inventory (cheaper than AWS Config)☆169Nov 20, 2025Updated 3 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- AWS Security Tools (AST) in a simple Docker container.☆284May 20, 2021Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆362Jun 24, 2020Updated 5 years ago