Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
☆165Dec 21, 2025Updated 2 months ago
Alternatives and similar repositories for aws-summarize-account-activity
Users that are interested in aws-summarize-account-activity are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 2 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated 2 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- ☆142Nov 24, 2025Updated 3 months ago
- ☆124May 26, 2025Updated 9 months ago
- ☆229Feb 24, 2026Updated last week
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- ☆30Jan 13, 2026Updated last month
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Kickstart and manage your AWS Organization via Terraform☆121Feb 16, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆193Updated this week
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- Automate permissions to your cloud and critical applications.☆242Feb 20, 2024Updated 2 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last week
- AWS Attack Path Management Tool - Walking on the Moon☆262Dec 5, 2024Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- ☆117Feb 11, 2026Updated 3 weeks ago
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆42Nov 27, 2024Updated last year
- ☆37Apr 9, 2025Updated 10 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- Repository for iamfast questions and issues☆176Mar 28, 2025Updated 11 months ago
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- ☆12Oct 17, 2023Updated 2 years ago
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆125Feb 6, 2025Updated last year
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- ☆169Sep 30, 2025Updated 5 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 3 weeks ago