seligman / cloud_sizesLinks
Track the sizes of different cloud providers
☆25Updated this week
Alternatives and similar repositories for cloud_sizes
Users that are interested in cloud_sizes are comparing it to the libraries listed below
Sorting:
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 4 years ago
- Automated determination of which AWS services run where☆20Updated this week
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆40Updated 2 weeks ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆112Updated 3 weeks ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆46Updated this week
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 4 months ago
- AWS IP Ranges History Tracker Amazon - AWS provides a list of IP Addresses used by their various services through a published ip-ranges.j…☆164Updated this week
- A meta-database collecting resources that compile lists of breaches☆21Updated 9 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- ☆23Updated 2 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Ghat is a tool for updating your GitHub actions and Terraform with the latest version of it dependencies and using immutable hashes inste…☆26Updated 4 months ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- Tracking the history and size of AWS's ip-ranges.json file☆273Updated this week
- A silly project for free (maybe) egress from EC2 instances using Tailscale and Session Manager☆31Updated 2 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 4 months ago
- Exit if environment variables known to be used as access tokens are set.☆15Updated 3 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆42Updated this week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated last week
- Python library for examining, creating and optimising IAM policies☆22Updated 3 years ago
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 3 years ago
- A tool to show what AWS account and identity you're using.☆57Updated last year
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 5 months ago
- A Golang program to rotate AWS & GCP account keys☆66Updated 3 months ago
- Look up region and other information for any AWS IP address☆90Updated 2 years ago
- AWS VPC Subnets Watcher☆78Updated 2 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago