Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.
☆29Aug 18, 2019Updated 6 years ago
Alternatives and similar repositories for detect-credential-compromise
Users that are interested in detect-credential-compromise are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- A tool to tag AWS resources in a unified manner☆11Jan 10, 2020Updated 6 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43May 20, 2021Updated 4 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Oct 21, 2019Updated 6 years ago
- AWS managed IAM policies☆128Dec 6, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Update an AWS security group with your current IP☆36Sep 29, 2019Updated 6 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Apr 10, 2023Updated 2 years ago
- CLI tool for injecting parameters stored in AWS SSM into executables.☆23May 28, 2020Updated 5 years ago
- ☆185Feb 23, 2026Updated last week
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Add Honeycode as a destination from AppFlow☆12Jun 25, 2022Updated 3 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- Easy switch between AWS Profiles and Regions☆13Jul 21, 2022Updated 3 years ago
- Fetch AWS Savings Plan prices into Excel☆14Jul 26, 2021Updated 4 years ago
- limit spend on AWS based on a tag, stop compute instances at threshold☆13Apr 13, 2020Updated 5 years ago
- ☆32Updated this week
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 5 years ago
- ☆63Oct 29, 2024Updated last year
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- A curated list of things relating to CapitalOne's Cloud-custodian project☆91Apr 25, 2020Updated 5 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- AHOVA has been deprecated and moved to a new solution called AWS Health Aware (AHA)☆13Mar 9, 2021Updated 4 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- ☆11Nov 13, 2017Updated 8 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago