jchrisfarris / detect-credential-compromiseView external linksLinks
Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.
☆29Aug 18, 2019Updated 6 years ago
Alternatives and similar repositories for detect-credential-compromise
Users that are interested in detect-credential-compromise are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 5 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 5 years ago
- A tool to tag AWS resources in a unified manner☆11Jan 10, 2020Updated 6 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43May 20, 2021Updated 4 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Oct 21, 2019Updated 6 years ago
- AWS managed IAM policies☆128Dec 6, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Update an AWS security group with your current IP☆36Sep 29, 2019Updated 6 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Apr 10, 2023Updated 2 years ago
- CLI tool for injecting parameters stored in AWS SSM into executables.☆23May 28, 2020Updated 5 years ago
- ☆184Nov 28, 2025Updated 2 months ago
- A CLI tool for building simple to complex IAM policies☆69Dec 5, 2023Updated 2 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- Retrospectively tag AWS resources so you can work out who created them☆110Dec 5, 2023Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Add Honeycode as a destination from AppFlow☆12Jun 25, 2022Updated 3 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- Fetch AWS Savings Plan prices into Excel☆14Jul 26, 2021Updated 4 years ago
- ☆31Updated this week
- ☆63Oct 29, 2024Updated last year
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 4 years ago
- limit spend on AWS based on a tag, stop compute instances at threshold☆13Apr 13, 2020Updated 5 years ago
- Easy switch between AWS Profiles and Regions☆13Jul 21, 2022Updated 3 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- AHOVA has been deprecated and moved to a new solution called AWS Health Aware (AHA)☆13Mar 9, 2021Updated 4 years ago