gemini-oss / starfleet
Whole-infrastructure automation tooling for AWS
☆41Updated 6 months ago
Alternatives and similar repositories for starfleet:
Users that are interested in starfleet are comparing it to the libraries listed below
- Safer AWS SCP deployments via real-time monitoring☆49Updated last year
- AWS SSO Reporter☆54Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Generates runbooks for GuardDuty findings☆35Updated 6 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Crowdsourced list of sensitive IAM Actions☆140Updated 2 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆111Updated this week
- Expand IAM Actions with Wildcards☆28Updated 3 weeks ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Kickstart and manage your AWS Organization via Terraform☆77Updated this week
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 9 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- A Golang program to rotate AWS & GCP account keys☆65Updated last week
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- SCP management tool☆129Updated last year
- Repository to archive AWS Documentation for local use☆41Updated 3 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated last month
- A collection of documented and undocumented AWS API models☆31Updated 2 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆96Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆36Updated last year
- ☆153Updated last year
- https://breaches.cloud☆36Updated 3 months ago
- ☆33Updated last year
- AWS honey token manager☆86Updated 5 months ago
- ☆26Updated 2 months ago
- ☆37Updated 11 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆140Updated last month