Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrusted accounts, insecure network configurations and more.
☆114Mar 25, 2026Updated this week
Alternatives and similar repositories for steampipe-mod-aws-perimeter
Users that are interested in steampipe-mod-aws-perimeter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them…☆19Updated this week
- View dashboards and reports across all of your AWS accounts using Powerpipe and Steampipe.☆99Updated this week
- Use SQL to instantly query resources, data sources and more from Terraform code. Open source CLI. No DB required.☆30Mar 19, 2026Updated last week
- ☆18Dec 31, 2024Updated last year
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆412Jan 30, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Use SQL to instantly query AWS resources across regions and accounts. Open source CLI. No DB required.☆224Updated this week
- Fun tools around the EBS Direct API☆20Apr 16, 2021Updated 4 years ago
- Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆27Updated this week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆38Jun 9, 2021Updated 4 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 4 months ago
- Vulnerability scanning just got lazier☆320Mar 19, 2026Updated last week
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SQLAlchemy wrapper around Steampipe☆16Aug 2, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- A curated list of awesome tools for Amazon EKS 🌊☆14May 30, 2020Updated 5 years ago
- rdsconn makes connecting to an AWS RDS instance inside a VPC from your laptop easier☆108Jul 13, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Scan publicly accessible assets on your AWS cloud environment☆136Jan 14, 2026Updated 2 months ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Mar 22, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Use SQL to instantly query repositories, users, gists and more from GitHub. Open source CLI. No DB required.☆87Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆23Updated this week
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Use SQL to instantly query Kubernetes API resources. Open source CLI. No DB required.☆61Updated this week
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated this week
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆41Aug 14, 2025Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 3 months ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Aug 28, 2024Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Python library for examining, creating and optimising IAM policies☆22Aug 10, 2022Updated 3 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Sep 30, 2023Updated 2 years ago