A meta-database collecting resources that compile lists of breaches
☆21Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for breach-list-database
Users that are interested in breach-list-database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- AWS VPC Subnets Watcher☆80Aug 23, 2023Updated 2 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated last month
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Track the sizes of different cloud providers☆27Updated this week
- Fresh list of all free email domain providers. Can be used to check if an email address belongs to a company. Updated weekly.☆39Apr 28, 2025Updated 10 months ago
- Lambda Extension for iamlive☆42May 17, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- High-performance open-source orchestration utility that utilizes EBS Direct APIs to efficiently clone, copy and migrate EBS snapshots to …☆39Dec 11, 2024Updated last year
- ☆63Oct 29, 2024Updated last year
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆39Sep 8, 2020Updated 5 years ago
- Diffs for structured data☆16Dec 26, 2018Updated 7 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 8 months ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- Mac setup and configuration via Ansible.☆12Jan 18, 2021Updated 5 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 3 years ago
- EC2 Flexibility Score assesses any configuration used to launch instances through an Auto Scaling Group (ASG) against the recommended EC2…☆28Nov 26, 2025Updated 3 months ago
- ☆13Aug 4, 2017Updated 8 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Draw horizonat lines at pre-defined key levels for the day.☆10Aug 27, 2024Updated last year
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- arXiv submission core☆14Jan 6, 2022Updated 4 years ago
- A simpler way to use Aurora Serverless Data API with Python.☆28Dec 8, 2022Updated 3 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago