mirror of
https://github.com/toniblyx/my-arsenal-of-aws-security-tools.git
synced 2025-12-17 08:04:20 +01:00
Add findmytakeover
This commit is contained in:
@@ -37,6 +37,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
|
||||
| **[nccgroup AWS-Inventory](https://github.com/nccgroup/aws-inventory)** | Make a inventory of all your resources across regions (Python) |[](https://badgen.net/github/stars/nccgroup/aws-inventory)| [](https://badgen.net/github/contributors/nccgroup/aws-inventory)[](https://badgen.net/github/watchers/nccgroup/aws-inventory)[](https://badgen.net/github/last-commit/nccgroup/aws-inventory) [](https://badgen.net/github/open-issues/nccgroup/aws-inventory) [](https://badgen.net/github/closed-issues/nccgroup/aws-inventory) |
|
||||
| **[Resource Counter](https://github.com/disruptops/resource-counter)** | Counts number of resources in categories across regions |[](https://badgen.net/github/stars/disruptops/resource-counter)| [](https://badgen.net/github/contributors/disruptops/resource-counter)[](https://badgen.net/github/watchers/disruptops/resource-counter)[](https://badgen.net/github/last-commit/disruptops/resource-counter) [](https://badgen.net/github/open-issues/disruptops/resource-counter) [](https://badgen.net/github/closed-issues/disruptops/resource-counter) |
|
||||
| **[SkyArk](https://github.com/cyberark/SkyArk)** | SkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS. |[](https://badgen.net/github/stars/cyberark/SkyArk)| [](https://badgen.net/github/contributors/cyberark/SkyArk)[](https://badgen.net/github/watchers/cyberark/SkyArk)[](https://badgen.net/github/last-commit/cyberark/SkyArk) [](https://badgen.net/github/open-issues/cyberark/SkyArk) [](https://badgen.net/github/closed-issues/cyberark/SkyArk) |
|
||||
| **[findmytakeover](https://github.com/anirudhbiyani/findmytakeover)** | find dangling domains in a multi cloud environment | [](https://badgen.net/github/stars/anirudhbiyani/findmytakeover) | [](https://badgen.net/github/contributors/anirudhbiyani/findmytakeover) [](https://badgen.net/github/watchers/anirudhbiyani/findmytakeover) [](https://badgen.net/github/last-commit/anirudhbiyani/findmytakeover) [](https://badgen.net/github/open-issues/anirudhbiyani/findmytakeover) [](https://badgen.net/github/closed-issues/anirudhbiyani/findmytakeover) |
|
||||
| **[Trailblazer AWS](https://github.com/willbengtson/trailblazer-aws)** | Trailblazer AWS determine what AWS API calls are logged by CloudTrail and what they are logged as. You can also use TrailBlazer as an attack simulation framework. |[](https://badgen.net/github/stars/willbengtson/trailblazer-aws)| [](https://badgen.net/github/contributors/willbengtson/trailblazer-aws)[](https://badgen.net/github/watchers/willbengtson/trailblazer-aws)[](https://badgen.net/github/last-commit/willbengtson/trailblazer-aws) [](https://badgen.net/github/open-issues/willbengtson/trailblazer-aws) [](https://badgen.net/github/closed-issues/willbengtson/trailblazer-aws) |
|
||||
| **[Lunar](https://github.com/lateralblast/lunar)** | Security auditing tool based on several security frameworks (it does some AWS checks) |[](https://badgen.net/github/stars/lateralblast/lunar)| [](https://badgen.net/github/contributors/lateralblast/lunar)[](https://badgen.net/github/watchers/lateralblast/lunar)[](https://badgen.net/github/last-commit/lateralblast/lunar) [](https://badgen.net/github/open-issues/lateralblast/lunar) [](https://badgen.net/github/closed-issues/lateralblast/lunar) |
|
||||
| **[Cloud-reports](https://github.com/tensult/cloud-reports)** | Scans your AWS cloud resources and generates reports |[](https://badgen.net/github/stars/tensult/cloud-reports)| [](https://badgen.net/github/contributors/tensult/cloud-reports)[](https://badgen.net/github/watchers/tensult/cloud-reports)[](https://badgen.net/github/last-commit/tensult/cloud-reports) [](https://badgen.net/github/open-issues/tensult/cloud-reports) [](https://badgen.net/github/closed-issues/tensult/cloud-reports) |
|
||||
@@ -83,6 +84,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
|
||||
| **[aws-list-resources](https://github.com/welldone-cloud/aws-list-resources)** | Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written to a JSON output file. | [](https://badgen.net/github/stars/welldone-cloud/aws-list-resources) | [](https://badgen.net/github/contributors/welldone-cloud/aws-list-resources) [](https://badgen.net/github/watchers/welldone-cloud/aws-list-resources) [](https://badgen.net/github/last-commit/welldone-cloud/aws-list-resources) [](https://badgen.net/github/open-issues/welldone-cloud/aws-list-resources) [](https://badgen.net/github/closed-issues/welldone-cloud/aws-list-resources) |
|
||||
| **[aws-summarize-account-activity](https://github.com/welldone-cloud/aws-summarize-account-activity)** | Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made and regions that were used. The summary is written to a JSON output file and can optionally be visualized as PNG files. | [](https://badgen.net/github/stars/welldone-cloud/aws-summarize-account-activity) | [](https://badgen.net/github/contributors/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/watchers/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/last-commit/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/open-issues/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/closed-issues/welldone-cloud/aws-summarize-account-activity) |
|
||||
|
||||
|
||||
## Offensive
|
||||
| Name | Description | Popularity | Metadata |
|
||||
| ---------- | :---------- | :----------: | :----------: |
|
||||
|
||||
Reference in New Issue
Block a user