introspector
varc
Our great sponsors
introspector | varc | |
---|---|---|
1 | 5 | |
66 | 231 | |
- | 0.9% | |
0.0 | 3.5 | |
over 2 years ago | 7 months ago | |
Python | Python | |
Mozilla Public License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
introspector
-
Open source: Catch AWS resource policy backdoors
And if you want to do some code review, it depends on supabase's postgres container and introspector
varc
- GitHub - cado-security/varc: Volatile Artifact Collector -- Open Source Tool to Collect Volatile Data for Incident Response
- Open source tool for collecting volatile data on compromised systems
- Varc - Volatile Artifact Collector
- varc - Open Source tool for Volatile Artifact Collection
- Open Source Tool to Collect Volatile Data for Incident Response
What are some alternatives?
PMapper - A tool for quickly evaluating IAM permissions in AWS.
turbinia - Automation and Scaling of Digital Forensics Tools
iamzero-python - Identity & Access Management simplified and secure for Python scripts and applications.
metabadger - Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
rds-auth-proxy - A "passwordless" login experience for your AWS RDS
AWSXenos - AWSXenos will list all the trust relationships in all the IAM roles and S3 buckets
ElectricEye - ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
timesketch - Collaborative forensic timeline analysis
applied-security - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Cybersecurity
aws-allowlister - Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
awspx - A graph-based tool for visualizing effective access and resource relationships in AWS environments.