keithrozario / potassium40
Potassium40, the radioactive lambda scanner
☆65Updated last year
Alternatives and similar repositories for potassium40:
Users that are interested in potassium40 are comparing it to the libraries listed below
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆57Updated 5 years ago
- ☆82Updated 5 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆160Updated 3 years ago
- ☆154Updated last year
- A honey token manager and alert system for AWS.☆317Updated 3 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆47Updated 9 months ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆105Updated 3 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆223Updated 4 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 4 years ago
- Pruun is a CL utility for easily creating AWS lambda deployment packages within Python virtualenvs.☆39Updated 4 years ago
- Make a network graph of an AWS region☆84Updated 5 years ago
- CLI tool for auditing S3 buckets☆109Updated last year
- Blazing CloudTrail since 2018☆135Updated 6 years ago
- The rules for pagination in AWS SDKs☆66Updated 5 years ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 5 years ago
- Undocumented Amazon S3 APIs and third-party extensions☆69Updated 2 years ago
- The SOCless automation framework☆137Updated last week
- one node Amazon ECS cluster using EC2 Spot instance and haproxy☆21Updated 2 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆261Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 10 months ago
- Tools to help automate your AWS Accounts☆99Updated 5 months ago
- Example detection of compromise credentials in AWS☆120Updated 6 years ago
- Scan publicly accessible assets on your AWS cloud environment☆139Updated 8 months ago
- boto3 code assistance for any API in any IDE, always up to date☆95Updated 2 years ago
- Repository for iamfast questions and issues☆171Updated 3 weeks ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- A tool to show what AWS account and identity you're using.☆93Updated last year
- A Python library for parsing AWS ARNs.☆44Updated last year
- Updated incident response generator for training classes☆43Updated 3 years ago