zoph-io / kyeLinks
KYE: Know Your Enemies - Check external access on your AWS account
☆129Updated 7 months ago
Alternatives and similar repositories for kye
Users that are interested in kye are comparing it to the libraries listed below
Sorting:
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Updated 7 months ago
- AWS honey token manager☆89Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 5 months ago
- Google Maps for AWS IAM☆254Updated last week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated 3 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆156Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆95Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆194Updated last month
- Collect IAM information from all your AWS organization, accounts, and resources.☆81Updated last week
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆180Updated 7 months ago
- A collection of documented and undocumented AWS API models☆52Updated 2 weeks ago
- AWS SSO Reporter☆55Updated 7 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆155Updated 5 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Updated 3 months ago
- SCP management tool☆134Updated 2 years ago
- ☆123Updated 6 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 6 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated 3 months ago
- Open-source best practices for protecting a secure, sensible cloud platform☆129Updated last year
- Generates runbooks for GuardDuty findings☆39Updated last year
- Expand IAM Actions with Wildcards☆34Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- Scalable integrity framework for ABAC on AWS☆56Updated 8 months ago
- ☆30Updated 8 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆188Updated 2 weeks ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated last month
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆39Updated last year
- Quickly query the AWS IP Ranges☆84Updated this week