Repokid Logo

Repokid

0
Free
Visit Website

Repokid uses Access Advisor provided by Aardvark to remove permissions granting access to unused services from the inline policies of IAM roles in an AWS account. Getting Started: - Install mkvirtualenv repokid - git clone git@github.com:Netflix/repokid.git - cd repokid - pip install -e . - repokid config config.json DynamoDB: - You will need a DynamoDB table called repokid_roles (specify account and endpoint in dynamo_db in config file). - The table should have RoleId (string) as a primary partition key, no primary sort key. - A global secondary index named Account with a primary partition key of Account and RoleId and Account as projected attributes. - A global secondary index named RoleName with a primary partition key of RoleName and RoleId and RoleName as projected attributes. - For development, you can run dynamo locally. To run locally: docker-compose up. The endpoint for DynamoDB will be http://localhost:8000. A DynamoDB admin panel can be found at http://localhost:8001. If you run the development version the table and index will be created for you automatically. IAM Permissions: - Repokid needs an IAM Role in each account that will be queried.

FEATURES

ALTERNATIVES

Abusing DNSAdmins privilege for escalation in Active Directory

Free

A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.

Free

Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.

Commercial

PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.

Free

Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.

Free

Akamai Identity Cloud is a CIAM solution that manages customer identities, enhances user experiences, and ensures data protection and regulatory compliance for high-volume consumer brands.

Commercial

Tool for associating IAM roles to Pods in Kubernetes clusters.

Free

Find leaked credentials by scanning repositories for high entropy strings.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved