latacora / remediate-AWS-IMDSv1
Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.
☆16Updated 3 years ago
Alternatives and similar repositories for remediate-AWS-IMDSv1:
Users that are interested in remediate-AWS-IMDSv1 are comparing it to the libraries listed below
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- Model files for undocumented AWS APIs☆13Updated 10 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Offensive Terraform Website☆44Updated 4 years ago
- Collection of incidents resulting from caching issues☆29Updated last month
- ☆22Updated 2 years ago
- ☆40Updated 5 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 2 weeks ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- A toolset to juggle AWS roles for persistent access☆56Updated 8 months ago
- ☆12Updated 5 months ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆40Updated this week
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 4 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆16Updated 3 weeks ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 2 years ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆14Updated 7 months ago
- notes on configuring aws organizations☆11Updated 8 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆33Updated 2 years ago
- ☆29Updated 5 months ago