gaul / undocumented-s3-apis
Undocumented Amazon S3 APIs and third-party extensions
☆69Updated 3 years ago
Alternatives and similar repositories for undocumented-s3-apis:
Users that are interested in undocumented-s3-apis are comparing it to the libraries listed below
- AWS Metadata Proxy for protection against SSRF☆67Updated 5 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 4 years ago
- The rules for pagination in AWS SDKs☆66Updated 5 years ago
- Cloud multi-account metadata management tool.☆88Updated 4 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Blazing CloudTrail since 2018☆136Updated 6 years ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- Internet connectivity for your VPC-attached Lambda functions without a NAT Gateway☆27Updated 3 years ago
- Download AWS bills from the console programmatically.☆60Updated last year
- A Python3 tool to help you determine the correct instance types to use for your running EC2/RDS instances☆32Updated 3 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆47Updated 10 months ago
- CLI tool for auditing S3 buckets☆109Updated last year
- Simple AWS Lambda powered Slack bot that reports your AWS Costs for the current month to a channel☆28Updated 4 years ago
- AWS Account Manager Email Manager Manager☆21Updated 5 years ago
- The original AWS security enforcer™☆60Updated 6 years ago
- Framework for inspecting and editing traffic in AWS VPCs☆113Updated 3 years ago
- ☆82Updated 5 years ago
- Checks AWS CloudFormation templates for security, reliability and conformity☆43Updated 4 years ago
- 🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github☆90Updated 6 years ago
- Example detection of compromise credentials in AWS☆121Updated 6 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆57Updated 5 years ago
- Make a network graph of an AWS region☆84Updated 5 years ago
- Simply connect to your 'EC2 Instance Connect'-capable AWS EC2 servers using one command☆52Updated 4 years ago
- A command line tool invoking self-describing Lambda functions.☆9Updated 5 years ago
- A visualizer of the network of security group dependencies in an AWS VPC.☆84Updated 4 years ago
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Use Cloud Control API to remediate drift that was detected on a CloudFormation stack☆48Updated 9 months ago
- A tool that adds features to AWS CloudFormation that reduce the amount of code you must write to deploy non-trivial applications.☆30Updated 6 years ago