tracebit-com / find-s3-account
Sample code for finding AWS Account ID of an S3 bucket.
☆49Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for find-s3-account
- A tool for quickly evaluating IAM permissions in AWS.☆70Updated 5 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 weeks ago
- A toolset to juggle AWS roles for persistent access☆52Updated 3 months ago
- Automated determination of which AWS services run where☆20Updated this week
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆61Updated 5 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- AWS STS token decoder☆37Updated 3 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- ☆22Updated last year
- A tool that allows downloading S3 directories as ZIP files☆34Updated last year
- An AWS metadata enumeration tool by Plerion☆76Updated 9 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Repository to archive GCP Documentation for local use☆13Updated 2 weeks ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆29Updated this week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆44Updated this week
- ☆42Updated 3 weeks ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 10 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- A silly project for free (maybe) egress from EC2 instances using Tailscale and Session Manager☆31Updated last year
- Tool for obfuscating and deobfuscating data.☆64Updated 8 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- ☆32Updated last year
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆74Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated 3 months ago
- Safer AWS SCP deployments via real-time monitoring☆44Updated last year
- ☆21Updated last year
- ☆47Updated last year
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- Offensive Terraform Website☆44Updated 4 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆24Updated last month