Scalable integrity framework for ABAC on AWS
☆56Mar 14, 2025Updated 11 months ago
Alternatives and similar repositories for control-tags
Users that are interested in control-tags are comparing it to the libraries listed below
Sorting:
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- AWS Trustline: Check external access on your AWS account☆129Updated this week
- ☆32Apr 1, 2025Updated 11 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- ☆124May 26, 2025Updated 9 months ago
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆12Feb 27, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- ☆18Jul 30, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Expand IAM Actions with Wildcards☆34Feb 25, 2026Updated last week
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆34Feb 12, 2026Updated 3 weeks ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Feb 26, 2026Updated last week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Collection of all previous 1337UP CTF challenges.☆78Jan 6, 2025Updated last year
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆55Apr 25, 2023Updated 2 years ago
- 🚀 Envilder is a CLI that securely centralizes your environment variables from AWS SSM as a single source of truth☆133Feb 22, 2026Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆116Apr 29, 2025Updated 10 months ago
- ☆46Nov 7, 2024Updated last year
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆28Dec 26, 2025Updated 2 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated last month
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year