welldone-cloud / aws-summarize-account-activityView external linksLinks
Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
☆165Dec 21, 2025Updated last month
Alternatives and similar repositories for aws-summarize-account-activity
Users that are interested in aws-summarize-account-activity are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Dec 21, 2025Updated last month
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated last month
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 2 months ago
- ☆142Nov 24, 2025Updated 2 months ago
- ☆124May 26, 2025Updated 8 months ago
- ☆228Jan 29, 2026Updated 2 weeks ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- ☆30Jan 13, 2026Updated last month
- A tool that allows downloading S3 directories as ZIP files☆35Apr 28, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Kickstart and manage your AWS Organization via Terraform☆118Jan 25, 2026Updated 2 weeks ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆190Jan 29, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An AWS IAM policy statement parser and query tool.☆197Updated this week
- Automate permissions to your cloud and critical applications.☆241Feb 20, 2024Updated last year
- AWS Attack Path Management Tool - Walking on the Moon☆260Dec 5, 2024Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 9 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆266Jan 26, 2023Updated 3 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆511May 15, 2025Updated 9 months ago
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- ☆116Updated this week
- ☆37Apr 9, 2025Updated 10 months ago
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆42Nov 27, 2024Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆647Updated this week
- Repository for iamfast questions and issues☆176Mar 28, 2025Updated 10 months ago
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆124Feb 6, 2025Updated last year
- ☆12Oct 17, 2023Updated 2 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 6 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- ☆169Sep 30, 2025Updated 4 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week