Bare minimum AWS Security Alerting and Secure by default Configuration
☆514May 15, 2025Updated 11 months ago
Alternatives and similar repositories for aws-security-survival-kit
Users that are interested in aws-security-survival-kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A command-line tool to get valuable information out of AWS CloudTrail☆833Apr 27, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated last month
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 4 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆655Apr 30, 2026Updated last week
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Apr 13, 2026Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆231Mar 27, 2026Updated last month
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52May 2, 2026Updated last week
- List of known AWS accounts☆257Apr 2, 2026Updated last month
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Sep 2, 2022Updated 3 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆287Nov 27, 2025Updated 5 months ago
- AWS CloudSaga - Simulate security events in AWS☆474Updated this week
- ☆65Aug 6, 2024Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆203Apr 28, 2026Updated last week
- IAMTrail☆509May 2, 2026Updated last week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆602Apr 8, 2026Updated last month
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆256Nov 17, 2025Updated 5 months ago
- ☆124Updated this week
- CLI tool that shows the future public IPv4 costs for a variety of AWS resources across all AWS regions from an account.☆89Jan 16, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,205May 2, 2026Updated last week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆301Apr 9, 2026Updated last month
- Automating situational awareness for cloud penetration tests.☆2,370Apr 21, 2026Updated 2 weeks ago
- AWS VPC Subnets Watcher☆80Aug 23, 2023Updated 2 years ago
- Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy☆3,368Apr 19, 2026Updated 2 weeks ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 4 months ago
- AWS IAM linting library☆1,115Jan 7, 2026Updated 4 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,304May 1, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆183Dec 21, 2025Updated 4 months ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated last month
- rdsconn makes connecting to an AWS RDS instance inside a VPC from your laptop easier☆108Jul 13, 2023Updated 2 years ago
- OWASP Domain Protect - prevent subdomain takeover☆396Dec 23, 2024Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆378Apr 26, 2026Updated last week