AWS Key Usage Detector Logo

AWS Key Usage Detector

0
Free
Updated 11 March 2025
Visit Website

This tool helps detect off-instance key usage in AWS by analyzing CloudTrail files in a local directory. Simply clone the repository, install the package, and run the program with the path to the CloudTrail files.

FEATURES

SIMILAR TOOLS

Converts the format of various S3 buckets for bug bounty and security testing.

Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.

Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.

A cloud and database asset intelligence platform that provides continuous monitoring, compliance management, and security posture assessment across hybrid cloud environments.

Commercial

Gatekeeper is a policy management tool for Kubernetes that provides an extensible, parameterized policy library and native Kubernetes CRDs for instantiating and extending the policy library.

Show the history and changes between configuration versions of AWS resources

A security tool to identify interesting files in AWS S3 buckets

Azure Guardrails enables rapid enforcement of cloud security guardrails by generating Terraform files for Azure Policy Initiatives.

A tool for testing AWS S3 bucket permissions and security

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved