Various AWS Automation Scripts
☆145Feb 28, 2018Updated 8 years ago
Alternatives and similar repositories for AWSScripts
Users that are interested in AWSScripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- ☆26Dec 8, 2025Updated 4 months ago
- ☆13Mar 30, 2020Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Terraform scripts that create a honey pot within AWS☆15Jun 7, 2024Updated last year
- Shell scripts to ease some AWS administration tasks.☆19Aug 31, 2015Updated 10 years ago
- This backs up Pinboard bookmarks to DynamoDB.☆19Apr 6, 2026Updated last week
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- AWS Automation boto3 scripts☆57Aug 14, 2019Updated 6 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- first commit☆24Feb 16, 2026Updated last month
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools to help automate your AWS Accounts☆100Sep 2, 2024Updated last year
- Sample pipeline for handling of security events in AWS.☆133Nov 1, 2019Updated 6 years ago
- Simple tool to easily switch between aws profiles.☆19Aug 14, 2020Updated 5 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Python script for AWS resources inventory (cheaper than AWS Config)☆169Nov 20, 2025Updated 4 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆911Dec 17, 2021Updated 4 years ago
- ☆124Sep 2, 2019Updated 6 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- Enforce ownership and data security within AWS☆446Oct 7, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Mar 29, 2022Updated 4 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆30Dec 4, 2017Updated 8 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- limit spend on AWS based on a tag, stop compute instances at threshold☆13Apr 13, 2020Updated 6 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆15Mar 27, 2026Updated 2 weeks ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Tunnel based Kubernetes ingress controller for any environment☆14Jan 5, 2020Updated 6 years ago
- ☆16Nov 6, 2017Updated 8 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago