erik / holepunchLinks
Punch holes in your AWS security groups.
☆70Updated 2 years ago
Alternatives and similar repositories for holepunch
Users that are interested in holepunch are comparing it to the libraries listed below
Sorting:
- An API and collection system to centralize important AWS resource information across multiple accounts☆88Updated 5 years ago
- ☆61Updated 2 years ago
- Simply connect to your 'EC2 Instance Connect'-capable AWS EC2 servers using one command☆52Updated 4 years ago
- Multi Account Command☆20Updated 5 years ago
- (Not maintained anymore) Bakery - Centralised AWS identity and access management solution for multiple accounts☆51Updated 7 years ago
- ☆22Updated 7 years ago
- THIS PROJECT IS NOT LONGER ACTIVELY MAINTAINED☆66Updated 3 years ago
- Add my IP to an AWS security group so I can ssh to instances (and do other useful things)☆49Updated 9 years ago
- awsmfa eases AWS multi-factor authentication for developers.☆81Updated last year
- A lambda function to send alerts (to Slack, HipChat) on AWS maintenance events.☆134Updated 2 years ago
- Reaps any and all instances which are not tagged with / past an expiration date.☆18Updated 7 years ago
- Deploy an AWS Lambda function to delete backing snapshots when an AMI is deregistered.☆12Updated 5 years ago
- A friendly command-line tool to query ECS☆90Updated 2 years ago
- Notifies slack when an IAM policy is created, changed or assigned to a role☆33Updated 4 years ago
- AWS Lambda function to tag EBS volumes created by autoscaling☆18Updated 7 years ago
- qaz—A CLI tool for Templating & Managing stacks in AWS Cloudformation☆90Updated 5 months ago
- Retired, please see https://github.com/sqlxpert/lights-off-aws☆23Updated 3 years ago
- HTTP proxy for AWS cost control☆81Updated 3 years ago
- AWS EC2 metadata as files☆106Updated 5 years ago
- Bash based AWS read-only client to make the AWS Console less necessary☆96Updated last year
- AWS Secrets Manager CLI☆21Updated 4 years ago
- Terraform AWS Permissions Generator☆55Updated 6 years ago
- Terraform provider for secrets stored with credstash☆68Updated 4 years ago
- Experiment to use SSM RunCommand instead of SSH☆145Updated 5 years ago
- Derive an AWS IAM Policy Document from actions found within Cloudtrail logs☆15Updated 6 years ago
- Run commands or shell under an AWS IAM role☆28Updated 2 years ago
- Run Docker containers within the context of an AWS IAM Role, and other development workflow helpers.☆58Updated 11 months ago
- Auth users connecting via SSH with IAM☆21Updated 5 years ago
- Create and destroy bastions on demand with Fargate.☆64Updated 3 years ago
- Simple Service Discovery for use in an AWS ECS cluster☆29Updated 9 years ago