planetscale / cloudranger
Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)
☆17Updated this week
Alternatives and similar repositories for cloudranger:
Users that are interested in cloudranger are comparing it to the libraries listed below
- Common Golang Packages for use by the Various Cloud Nuke Tools☆40Updated this week
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆27Updated last week
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 3 weeks ago
- ☆21Updated 2 years ago
- ☆40Updated 5 months ago
- A tool that allows downloading S3 directories as ZIP files☆34Updated 2 years ago
- ☆22Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆52Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 8 months ago
- ☆25Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 2 weeks ago
- ☆33Updated 2 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- ☆30Updated 3 weeks ago
- ☆20Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆76Updated this week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆44Updated this week
- A command-line tool to perform Local Health Check Probes inside Container Images (ECS, Docker)☆50Updated last week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 3 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- ☆29Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 3 months ago
- ☆64Updated last week
- A toolset to juggle AWS roles for persistent access☆56Updated 8 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 4 months ago
- Automated determination of which AWS services run where☆20Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated this week
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆36Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 8 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆66Updated 3 weeks ago