AWS Trustline: Check external access on your AWS account
☆129Feb 27, 2026Updated 2 months ago
Alternatives and similar repositories for aws-trustline
Users that are interested in aws-trustline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 7 months ago
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆378Dec 6, 2025Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Apr 26, 2026Updated last week
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 4 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆203Mar 17, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 3 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- List of known AWS accounts☆257Apr 2, 2026Updated last month
- ☆24Mar 4, 2025Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An SMTP server sidecar to allow AWS SES usage with IAM roles☆15Apr 7, 2026Updated 3 weeks ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆76Oct 18, 2025Updated 6 months ago
- ☆18Jul 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 10 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆203Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- ☆13Feb 17, 2024Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- ☆10Aug 11, 2025Updated 8 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 23, 2026Updated last week
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Aug 13, 2025Updated 8 months ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Apr 26, 2026Updated last week
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆183Dec 21, 2025Updated 4 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- Google Maps for AWS IAM☆272Updated this week
- MCP server for understanding AWS spend☆127Apr 14, 2025Updated last year
- Inspect messages in an AWS SQS queue in a simple and deliberate manner☆57Updated this week