Enumerate IAM Permissions is a security assessment tool designed to identify and map the permissions associated with AWS credentials through systematic API call enumeration. The tool operates by performing brute-force testing against AWS APIs to determine which actions are permitted by a given IAM policy. It focuses primarily on non-destructive operations, specifically targeting get* and list* API calls to avoid causing any modifications or damage to the AWS environment during testing. The enumeration process helps security professionals and administrators understand the actual scope of permissions granted to specific AWS credentials, which may differ from the intended or documented permissions. This capability is particularly useful for security audits, privilege escalation assessments, and identifying potential over-privileged accounts. The tool provides visibility into the effective permissions of IAM policies by testing real API calls rather than relying solely on policy document analysis. This approach can reveal permissions that might be granted through complex policy combinations, inheritance, or service-linked roles that may not be immediately apparent from static policy review.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An AWS IAM security assessment tool that identifies least privilege violations and generates risk-prioritized reports for IAM policy remediation.
A simple drop-in library for managing users, permissions, and groups in your application.
A list of disposable email domains to detect or block disposable accounts
An automated script that configures Active Directory domains using customizable XML configuration files.
A list of Windows privilege escalation techniques, categorized and explained in detail.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.