*https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/*
https://github.com/RhinoSecurityLabs/IAMActionHunter
Quickly and easily evaluate one or more IAM policies to find issues.
This is a tool you can use to more quickly understand what the vulnerability might be across one policy or across multiple policies.
https://github.com/prisma-cloud/IAMFinder
IAMFinder enumerates and finds users and IAM roles in a target AWS account.
https://github.com/andresriancho/enumerate-iam
Enumerate the permissions associated with an AWS credential set. This tool tries to brute force all API calls allowed by the IAM policy. The calls performed by this tool are all non-destructive (only get* and list* calls are performed). Great for finding weaknesses you may not have manually found.
https://github.com/nccgroup/PMapper
A tool for quickly evaluating IAM permissions in AWS.