Blazing CloudTrail since 2018
☆138Jan 27, 2019Updated 7 years ago
Alternatives and similar repositories for trailblazer-aws
Users that are interested in trailblazer-aws are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Dec 17, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- ☆159Jul 8, 2023Updated 2 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆831Updated this week
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Apr 25, 2024Updated last year
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆910Dec 17, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆448Jul 17, 2023Updated 2 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,545Aug 2, 2024Updated last year
- ☆375Feb 23, 2024Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- The original AWS security enforcer™☆61Mar 6, 2019Updated 7 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Jan 23, 2026Updated 2 months ago
- A honey token manager and alert system for AWS.☆321Dec 19, 2021Updated 4 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Feb 17, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆302Updated this week
- Automated CloudFormation drift remediation using Import functionality☆28Feb 23, 2022Updated 4 years ago
- Enforce ownership and data security within AWS☆446Oct 7, 2020Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆608Nov 28, 2024Updated last year
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 3 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- Python installable command line utiltity for mitigation of host and key compromises.☆346Jul 23, 2021Updated 4 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Feb 18, 2021Updated 5 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Feb 22, 2023Updated 3 years ago
- Some of my personal rules for CapitalOne's Cloud Custodian project☆45Apr 20, 2021Updated 4 years ago
- A CLI tool for building simple to complex IAM policies☆69Dec 5, 2023Updated 2 years ago
- No need for IAM users when we have Yubikeys☆158Apr 7, 2022Updated 3 years ago
- A collection of AWS penetration testing junk☆1,223Aug 30, 2023Updated 2 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago