A meta-database collecting resources that compile lists of breaches
☆21Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for breach-list-database
Users that are interested in breach-list-database are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- High-performance open-source orchestration utility that utilizes EBS Direct APIs to efficiently clone, copy and migrate EBS snapshots to …☆39Dec 11, 2024Updated last year
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated 3 weeks ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆39Sep 8, 2020Updated 5 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Lambda Extension for iamlive☆42May 17, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- ☆20Mar 3, 2018Updated 8 years ago
- SleepIQ Homebridge plugin☆19Feb 11, 2022Updated 4 years ago
- AWS VPC Subnets Watcher☆79Aug 23, 2023Updated 2 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated 2 weeks ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- ☆63Oct 29, 2024Updated last year
- A simpler way to use Aurora Serverless Data API with Python.☆28Dec 8, 2022Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Track the sizes of different cloud providers☆26Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 3 years ago
- Full Camect Hub integration for Home Assistant / HACS☆13Jan 15, 2025Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 10 months ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆31Oct 28, 2024Updated last year
- ☆65Aug 6, 2024Updated last year
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 7 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- A simple C# (Windows Forms) application for measuring angles between any objects on the screen.☆15Dec 2, 2025Updated 3 months ago