AWS Trustline: Check external access on your AWS account
☆129Feb 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for aws-trustline
Users that are interested in aws-trustline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆374Dec 6, 2025Updated 3 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 3 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆200Mar 17, 2026Updated last week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- ☆23Mar 4, 2025Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- An SMTP server sidecar to allow AWS SES usage with IAM roles☆15Feb 7, 2023Updated 3 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆76Oct 18, 2025Updated 5 months ago
- ☆18Jul 30, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆196Updated this week
- ☆13Feb 17, 2024Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- ☆10Aug 11, 2025Updated 7 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Mar 14, 2026Updated last week
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated 3 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- Google Maps for AWS IAM☆271Updated this week
- MCP server for understanding AWS spend☆127Apr 14, 2025Updated 11 months ago
- Inspect messages in an AWS SQS queue in a simple and deliberate manner☆57Mar 12, 2026Updated last week