AWS List Resources Logo

AWS List Resources

0
Free
Visit Website

Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written to a JSON output file. Make sure you have AWS credentials configured for your target account. This can either be done using environment variables or by specifying a named profile in the optional --profile argument. Read-only IAM permissions are sufficient. If you run the script against specific regions, it is recommended to also include the us-east-1 region. This ensures that resources of global AWS services are captured as well. Example invocations: pip install -r requirements.txt python aws_list_resources.py --regions us-east-1,eu-central-1 python aws_list_resources.py --regions ALL python aws_list_resources.py --regions ALL --include-resource-types AWS::EC2::*,AWS::DynamoDB::* --exclude-resource-types AWS::EC2::DHCPOptions,AWS::EC2::VPCGatewayAttachment Supported arguments: --exclude-resource-types do not list the specified comma-separated resource types (supports wildcards) --include-resource-types only list the specified comma-separated resource types (supports wildcards)

FEATURES

ALTERNATIVES

A Lambda Function that disables AWS IAM User Access Keys after a set amount of time to reduce the risk associated with old access keys.

Python library for building Docker images with advanced features.

Golang client for querying SecurityTrails API data

S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.

AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.

A fully managed service that securely stores, rotates, and manages sensitive data such as database credentials and API keys.

A workload policy enforcement tool for Kubernetes with various supported policies and configuration options.

A tool to enumerate S3 buckets for a specific target

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved