Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written to a JSON result file.
☆184Dec 21, 2025Updated 3 months ago
Alternatives and similar repositories for aws-list-resources
Users that are interested in aws-list-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 3 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 3 months ago
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated last month
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆36Jan 19, 2023Updated 3 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 3 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆103Feb 1, 2025Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Aug 13, 2025Updated 8 months ago
- ☆65Aug 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆101Apr 7, 2026Updated last week
- ☆46Nov 7, 2024Updated last year
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆201Jan 6, 2026Updated 3 months ago
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆16Oct 5, 2023Updated 2 years ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆595Updated this week
- Expand IAM Actions with Wildcards☆35Apr 6, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Jan 26, 2023Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆354Mar 10, 2026Updated last month
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Nov 13, 2023Updated 2 years ago
- A Python CLI tool and library for finding unused CIDR blocks in AWS VPCs.☆29Nov 22, 2025Updated 4 months ago
- Get notified when actions are taken in the AWS Console.☆331Jan 20, 2025Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,128Mar 10, 2026Updated last month
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆299Updated this week
- ☆124May 26, 2025Updated 10 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- List of known AWS accounts☆257Apr 2, 2026Updated last week
- An AWS IAM policy statement parser and query tool.☆199Feb 10, 2026Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆50Mar 10, 2026Updated last month
- A VSCode Dev Container with tools to help you build and manage AWS infrastructure with Terraform☆161Jun 11, 2025Updated 10 months ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Mar 24, 2025Updated last year