tleyden / keynuker
ππ₯ KeyNuker - nuke AWS keys accidentally leaked to Github
β90Updated 6 years ago
Alternatives and similar repositories for keynuker:
Users that are interested in keynuker are comparing it to the libraries listed below
- Show the history and changes between configuration versions of AWS resourcesβ70Updated 6 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)β31Updated 5 years ago
- Secure Property Store for Cloud Applicationsβ80Updated 5 years ago
- Notifies slack when an IAM policy is created, changed or assigned to a roleβ33Updated 3 years ago
- CLI tool for auditing S3 bucketsβ107Updated last year
- A serverless, event-driven AWS configuration collection service with configuration versioning.β94Updated 4 years ago
- Cloud multi-account metadata management tool.β91Updated 4 years ago
- CloudTrail and CloudWatch configuration with some basic security alarms.β18Updated 7 years ago
- Dump your EC2 Security Groups as a CSV or JSON fileβ71Updated 2 years ago
- Evident Security Platform Custom Signatures Samplesβ28Updated 6 years ago
- A small lambda script that will disable access keys older than a given amount of days.β154Updated 2 years ago
- Marking instances dirty since 2018β47Updated 6 years ago
- AWS Metadata Proxy for protection against SSRFβ68Updated 5 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providersβ77Updated 2 years ago
- Checks AWS CloudFormation templates for security, reliability and conformityβ43Updated 4 years ago
- Amazon WAF Security Automation deployment (modular with Terraform)β73Updated 6 years ago
- A cli tool for importing and exporting AWS IAM configuration to YAML filesβ243Updated 2 years ago
- Gives a quick price check for an instance typeβ39Updated 8 months ago
- Blazing CloudTrail since 2018β137Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.β29Updated 5 years ago
- A lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is createdβ15Updated 6 years ago
- This ansible role gets information from an AWS VPC and generate a graphical representation of security groupsβ104Updated 4 years ago
- Bash based AWS read-only client to make the AWS Console less necessaryβ96Updated 11 months ago
- β20Updated 7 years ago
- Undocumented Amazon S3 APIs and third-party extensionsβ70Updated 3 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Functionβ46Updated last year
- An automated reference implementation that assists with setting up corss account roles for easy federation of users from one AWS master aβ¦β57Updated 7 years ago
- The original AWS security enforcerβ’β61Updated 6 years ago
- β61Updated 2 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.β59Updated 5 years ago