zoph-io / kyeView external linksLinks
KYE: Know Your Enemies - Check external access on your AWS account
☆129Apr 25, 2025Updated 9 months ago
Alternatives and similar repositories for kye
Users that are interested in kye are comparing it to the libraries listed below
Sorting:
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 3 months ago
- Map visualization and firewall for AWS activity, inspired by Little Snitch for macOS.☆372Dec 6, 2025Updated 2 months ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Putting a leash on naughty AWS permissions☆134Sep 5, 2025Updated 5 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆197Feb 2, 2026Updated last week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated last month
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Updated this week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Jul 4, 2025Updated 7 months ago
- List of known AWS accounts☆252Feb 6, 2026Updated last week
- AWS honey token manager☆89Aug 1, 2024Updated last year
- ☆23Mar 4, 2025Updated 11 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated last month
- Example policies demonstrating how to implement a data perimeter on AWS.☆190Jan 29, 2026Updated 2 weeks ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Jan 25, 2025Updated last year
- ☆12Jun 17, 2024Updated last year
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 3 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- ☆76Oct 18, 2025Updated 3 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Sep 13, 2025Updated 5 months ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 6 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Feb 1, 2025Updated last year
- ☆36Apr 29, 2025Updated 9 months ago
- If these strings are in your code, you might have a problem!☆50Dec 12, 2025Updated 2 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week