tracebit-com / find-s3-account
Sample code for finding AWS Account ID of an S3 bucket.
☆49Updated 10 months ago
Alternatives and similar repositories for find-s3-account:
Users that are interested in find-s3-account are comparing it to the libraries listed below
- A tool for quickly evaluating IAM permissions in AWS.☆72Updated 7 months ago
- A toolset to juggle AWS roles for persistent access☆53Updated 5 months ago
- AWS STS token decoder☆37Updated 5 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆61Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- ☆32Updated 5 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- ☆22Updated last year
- Common Golang Packages for use by the Various Cloud Nuke Tools☆35Updated last week
- Automated determination of which AWS services run where☆20Updated this week
- Repository to archive GCP Documentation for local use☆13Updated 2 months ago
- The Jolly Executioner - a simple command execution proxy☆16Updated 7 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated last week
- An AWS metadata enumeration tool by Plerion☆83Updated 11 months ago
- ☆47Updated last year
- ☆30Updated 2 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆38Updated this week
- ☆46Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆24Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- This is a custom SSM agent which is sorta functional☆17Updated 3 years ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year