sHesl / amazon-where-servicesLinks
Automated determination of which AWS services run where
☆20Updated last week
Alternatives and similar repositories for amazon-where-services
Users that are interested in amazon-where-services are comparing it to the libraries listed below
Sorting:
- ☆41Updated 6 months ago
- A meta-database collecting resources that compile lists of breaches☆19Updated 6 months ago
- A toolset to juggle AWS roles for persistent access☆57Updated 9 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- Security Alert Decoration☆27Updated last month
- ☆22Updated 2 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated 2 weeks ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 weeks ago
- Model files for undocumented AWS APIs☆13Updated 11 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Kubernetes audit logging, when you don't control the control plane☆79Updated this week
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆55Updated 11 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆13Updated last week
- Common Golang Packages for use by the Various Cloud Nuke Tools☆40Updated 2 weeks ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆44Updated this week
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- ☆20Updated 2 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆95Updated 4 months ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 9 months ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A tool to show what AWS account and identity you're using.☆57Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year