introspector
aws-allowlister
Our great sponsors
introspector | aws-allowlister | |
---|---|---|
1 | 3 | |
66 | 218 | |
- | 1.4% | |
0.0 | 0.0 | |
over 2 years ago | 9 months ago | |
Python | Python | |
Mozilla Public License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
introspector
-
Open source: Catch AWS resource policy backdoors
And if you want to do some code review, it depends on supabase's postgres container and introspector
aws-allowlister
What are some alternatives?
PMapper - A tool for quickly evaluating IAM permissions in AWS.
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
iamzero-python - Identity & Access Management simplified and secure for Python scripts and applications.
Aura2LWC - This VSCode Extension automatically converts Aura Components to LWC
rds-auth-proxy - A "passwordless" login experience for your AWS RDS
cloudsplaining - Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
ElectricEye - ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
applied-security - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Cybersecurity
policy_sentry - IAM Least Privilege Policy Generator
metabadger - Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
varc - Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.