Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.
☆29Aug 18, 2019Updated 6 years ago
Alternatives and similar repositories for detect-credential-compromise
Users that are interested in detect-credential-compromise are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to tag AWS resources in a unified manner☆11Jan 10, 2020Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Oct 21, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- AWS managed IAM policies☆129Dec 6, 2021Updated 4 years ago
- Easy switch between AWS Profiles and Regions☆13Jul 21, 2022Updated 3 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43May 20, 2021Updated 4 years ago
- ☆185Feb 23, 2026Updated last month
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Apr 10, 2023Updated 2 years ago
- ☆63Oct 29, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- Retrospectively tag AWS resources so you can work out who created them☆110Dec 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Add Honeycode as a destination from AppFlow☆12Jun 25, 2022Updated 3 years ago
- Prevents you from committing secrets and credentials into git repositories☆17Oct 15, 2019Updated 6 years ago
- CLI tool for injecting parameters stored in AWS SSM into executables.☆23May 28, 2020Updated 5 years ago
- limit spend on AWS based on a tag, stop compute instances at threshold☆13Apr 13, 2020Updated 5 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- A curated list of things relating to CapitalOne's Cloud-custodian project☆91Apr 25, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple web app for adding/removing EC2 ssh access to an IP☆42Feb 18, 2019Updated 7 years ago
- A forward proxy for machines, with access control lists☆16Sep 7, 2023Updated 2 years ago
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- Stepper allows you to write AWS Step Functions using a higher level programmatic language.☆15Jul 27, 2019Updated 6 years ago
- Automate the daily partitioning of your CloudTrail bucket in Athena☆28Oct 19, 2023Updated 2 years ago
- Security aspects of AWS products for the Security Specialist certification☆211May 12, 2022Updated 3 years ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 7 years ago