latacora / remediate-AWS-IMDSv1
Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.
☆16Updated 3 years ago
Related projects: ⓘ
- A meta-database collecting resources that compile lists of breaches☆17Updated 5 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆22Updated last week
- Fun tools around the EBS Direct API☆17Updated 3 years ago
- A toolset to juggle AWS roles for persistent access☆47Updated last month
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated 10 months ago
- Automated determination of which AWS services run where☆20Updated this week
- Security Alert Decoration☆25Updated 4 months ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆13Updated 2 years ago
- ☆21Updated last year
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how commo…☆43Updated last year
- ☆13Updated last month
- Offensive Terraform Website☆44Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated 6 months ago
- Darkbit Cloud Security Tools☆25Updated 3 years ago
- ☆31Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- Sample code for finding AWS Account ID of an S3 bucket.☆46Updated 6 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 3 weeks ago
- Scripts to quickly fix security and compliance issues☆25Updated 9 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Visualize your Terraform files☆34Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆18Updated 3 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 2 years ago
- notes on configuring aws organizations☆11Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated last month
- Clean accounts over permissions in GCP infra at scale☆70Updated last year
- Collection of incidents resulting from caching issues☆25Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆56Updated last year