-
endgame
Discontinued An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈 (by salesforce)
-
endgame
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈 (by agnivesh)
-
Scout Monitoring
Free Django app performance insights with Scout Monitoring. Get Scout setup in minutes, and let us sweat the small stuff. A couple lines in settings.py is all you need to start monitoring your apps. Sign up for our free tier today.
Nope... https://github.com/agnivesh/endgame and 64 other forks.... 😬 Once something has been public on GitHub and people have taken a liking to it, it's there forever.
I get that it'd do damage if run by a user on an active account but so would https://github.com/rebuy-de/aws-nuke or an unchecked Terraform module example, or a container in an EKS cluster with overly permissive instance profile or a containerised CICD tool with heavy privileges in the orchestrator.
Related posts
-
My personal AWS account setup - IAM Identity Center, temporary credentials and sandbox account
-
How to delete all AWS resources using aws-nuke
-
E1S – Easily Manage AWS ECS Resources in Terminal
-
E1s – A Terminal-Based AWS ECS Management Tool(~K9s for ECS)
-
I am afraid to spin up an EKS instance using AWS provider