A tool that helps keeping track of your AWS quota utilization

Overview

aws-quota-checker

A tool that helps keeping track of your AWS quota utilization. It'll determine the limits of your AWS account and compare them to the number of current resources.

Example output of aws-quota-checker

This is especially useful cause today, cloud resources are being created from all kinds of sources, e.g. IaC and Kubernetes operators. This tool will give you a head start for requesting quota increases before you hit a quota limit to prevent being stuck with a production system not being able to scale anymore.

A usual use case is to add it to your CI pipeline right after applying your IaC or run it on a regular basis. Feel free to leave a vote on this issue if you'd like to see a Prometheus exporter.

Installation

From pypi

pip install aws-quota-checker

From source

git clone [email protected]:brennerm/aws-quota-checker.git
cd aws-quota-checker
pip install .

Usage

Make sure you are logged into your AWS account (aws configure or through environment variables) or switch to the one you want to check. This account needs to have read permissions for all supported services. AWS provides a default policy called ReadOnlyAccess that contains the required permissions.

Check the help page with aws-quota-checker --help to see all available command and their documentation.

Run a single check

$ aws-quota-checker check vpc_count
AWS profile: default | AWS region: eu-central-1 | Active checks: vpc_count
VPCs per region [default/eu-central-1]: 1/5 ✓

Run all checks

$ aws-quota-checker check all
AWS profile: default | AWS region: eu-central-1 | Active checks: route53_traffic_policy_count,vpc_count,ec2_tgw_count,ec2_on_demand_standard_count,route53_health_check_count,cw_alarm_count,iam_attached_policy_per_role,asg_count,elasticbeanstalk_environment_count,s3_bucket_count,iam_attached_policy_per_user,elb_listeners_per_alb,ec2_eip_count,route53resolver_rule_count,iam_policy_version_count,elb_listeners_per_nlb,vpc_subnets_per_vpc,route53_vpcs_per_hosted_zone,cf_stack_count,iam_user_count,elb_listeners_per_clb,ni_count,dyndb_table_count,elasticbeanstalk_application_count,route53_traffic_policy_instance_count,ig_count,elb_clb_count,ec2_vpn_connection_count,route53_reusable_delegation_set_count,ebs_snapshot_count,route53_hosted_zone_count,iam_attached_policy_per_group,eks_count,am_mesh_count,elb_target_group_count,route53resolver_rule_association_count,iam_server_certificate_count,elb_alb_count,vpc_acls_per_vpc,iam_group_count,ec2_spot_standard_count,route53resolver_endpoint_count,iam_policy_count,elb_nlb_count,sg_count,route53_records_per_hosted_zone,lc_count,ecs_count,secretsmanager_secrets_count
Collecting checks  [####################################]  100%
Route53 Traffic Policies per Account [default]: 0/50 ✓
VPCs per region [default/eu-central-1]: 1/5 ✓
Transit Gateways per account [default]: 4/5 !
Running On-Demand Standard (A, C, D, H, I, M, R, T, Z) EC2 instances [default]: 0/1280 ✓
Route53 Health Checks per Account [default]: 0/200 ✓
Number of CloudWatch alarms per region [default/eu-central-1]: 0/5000 ✓
Auto Scaling groups per region [default/eu-central-1]: 0/200 ✓
Elastic Beanstalk Environments per account [default]: 0/200 ✓
Application Load Balancers per region [default/eu-central-1]: 46/50 X
...

Run a single instance check

$ aws-quota-checker check-instance vpc_acls_per_vpc vpc-0123456789
Network ACLs per VPC [default/eu-central-1/vpc-0123456789]: 0/200

Missing a quota check?

Feel free to create a new issue with the New Check label including a description which quota check you are missing.

Comments
  • Add RDS snapshot quota checks

    Add RDS snapshot quota checks

    Adds quota checks for Manual DB cluster snapshots and Manual DB instance snapshots https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Limits.html#RDS_Limits.Limits image

    $ aws-quota-checker check rds_db_snapshots,rds_db_cluster_snapshots
    AWS profile: default | AWS region: ap-southeast-2 | Active checks: rds_db_cluster_snapshots,rds_db_snapshots
    Collecting checks  [####################################]  100%
    Manual DB cluster snapshots per Region [xxx/ap-southeast-2]: 0/200 ✓
    Manual DB instance snapshots per Region [xxx/ap-southeast-2]: 152/200 ✓
    
    opened by kedoodle 4
  • Version 1.10.0

    Version 1.10.0

    Added

    • fix MaxResults=1000 for EC2 instances check (from baec59a)
    • new checks: ecsstrg_count,fargatespot_count,fargatedemand_count,iam_role_count (from #23)
    • added service/quota_code: iam_user_count
    • fixed description: s3_bucket_count
    • feature: display NOTDEF for check if limit in AWS is not default (was increased)
    • catch EndpointConnectionError
    opened by alt-dima 4
  • Paginate ebs_snapshot_count check

    Paginate ebs_snapshot_count check

    This PR fixes a memory usage issue whereby quota checks make a single boto3 call, even when supposedly paginating. Symptoms described in this comment on #31.

    • Uses the existing paginator to count the ebs_snapshot_count quota
    • Sets a default pagination page size (otherwise the paginator just gets all resources in my testing of describe_snapshots)
    • Fixes up an error log message

    See memory usage spikes to ~800 MiB on 1.10.0 and is fairly stable at ~50 MiB on this branch. image

    Before:

    • Locally
      $ time aws-quota-checker check ebs_snapshot_count
      
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: ebs_snapshot_count
      EBS Snapshots per Region [xxx/ap-southeast-2]: 34896/100000 ✓
      aws-quota-checker check ebs_snapshot_count  12.72s user 2.32s system 3% cpu 7:27.41 total
      
    • In cluster (~3 minutes):
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: 
      cf_stack_count,ebs_snapshot_count,rds_instances,s3_bucket_count
      ...
      07-Jan-22 06:10:21 [INFO] aws_quota.prometheus - refreshing current values
      07-Jan-22 06:13:39 [INFO] aws_quota.prometheus - current values refreshed
      

    After:

    • Locally:
      $ time aws-quota-checker check ebs_snapshot_count
      
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: ebs_snapshot_count
      EBS Snapshots per Region [xxx/ap-southeast-2]: 34899/100000 ✓
      aws-quota-checker check ebs_snapshot_count  12.33s user 1.36s system 16% cpu 1:25.01 total
      
    • In cluster (~1 minute):
      AWS profile: default | AWS region: ap-southeast-2 | Active checks: 
      cf_stack_count,ebs_snapshot_count,rds_instances,s3_bucket_count
      ...
      07-Jan-22 08:47:46 [INFO] aws_quota.prometheus - refreshing current values
      07-Jan-22 08:48:55 [INFO] aws_quota.prometheus - current values refreshed
      
    opened by kedoodle 2
  • Compatibility with python3

    Compatibility with python3

    Getting the following error while running it inside a kubernetes pod or even as a container

    Traceback (most recent call last): File "/usr/local/bin/aws-quota-checker", line 7, in from aws_quota.cli import cli File "/usr/local/lib/python3.7/site-packages/aws_quota/cli.py", line 2, in from aws_quota.utils import get_account_id File "/usr/local/lib/python3.7/site-packages/aws_quota/utils.py", line 6, in def get_account_id(session: boto3.Session) -> str: File "/usr/lib64/python3.7/functools.py", line 490, in lru_cache raise TypeError('Expected maxsize to be an integer or None') TypeError: Expected maxsize to be an integer or None

    opened by rishavsharma9802 2
  • ebs_snapshot_count seems high

    ebs_snapshot_count seems high

    I'm seeing EBS Snapshots per region [default/eu-west-1]: 25780/100000 ✓ for an account with only a handful of actual snapshots. Perhaps change

    return len(self.boto_session.client('ec2').describe_snapshots()['Snapshots'])
    

    To

    return len(self.boto_session.client('ec2').describe_snapshots(OwnerIds=["self"])['Snapshots'])
    
    opened by cariaso 2
  • Bump urllib3 from 1.26.4 to 1.26.5

    Bump urllib3 from 1.26.4 to 1.26.5

    Bumps urllib3 from 1.26.4 to 1.26.5.

    Release notes

    Sourced from urllib3's releases.

    1.26.5

    :warning: IMPORTANT: urllib3 v2.0 will drop support for Python 2: Read more in the v2.0 Roadmap

    • Fixed deprecation warnings emitted in Python 3.10.
    • Updated vendored six library to 1.16.0.
    • Improved performance of URL parser when splitting the authority component.

    If you or your organization rely on urllib3 consider supporting us via GitHub Sponsors

    Changelog

    Sourced from urllib3's changelog.

    1.26.5 (2021-05-26)

    • Fixed deprecation warnings emitted in Python 3.10.
    • Updated vendored six library to 1.16.0.
    • Improved performance of URL parser when splitting the authority component.
    Commits
    • d161647 Release 1.26.5
    • 2d4a3fe Improve performance of sub-authority splitting in URL
    • 2698537 Update vendored six to 1.16.0
    • 07bed79 Fix deprecation warnings for Python 3.10 ssl module
    • d725a9b Add Python 3.10 to GitHub Actions
    • 339ad34 Use pytest==6.2.4 on Python 3.10+
    • f271c9c Apply latest Black formatting
    • 1884878 [1.26] Properly proxy EOF on the SSLTransport test suite
    • See full diff in compare view

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 1
  • [New Check] Roles in an AWS account

    [New Check] Roles in an AWS account

    The AWS console is warning us about getting close to the limit for number of IAM roles (1000). Would like to have a check for this limit.

    https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entities

    opened by charleshepner 1
  • Regression for blacklist check in 1.3.0

    Regression for blacklist check in 1.3.0

    Running check with a blacklist entry in 1.3.0 returns a usage error.

    (aws-quota-checker) [(HEAD detached at 1.3.0)] aws-quota-checker $ aws-quota-checker check 'all,!vpc_count'
    Usage: aws-quota-checker check [OPTIONS] [all|am_mesh_count|asg_count|cf_stack
                                   _count|cw_alarm_count|dyndb_table_count|ebs_sna
                                   pshot_count|ec2_eip_count|ec2_on_demand_f_count
                                   |ec2_on_demand_g_count|ec2_on_demand_inf_count|
                                   ec2_on_demand_p_count|ec2_on_demand_standard_co
                                   unt|ec2_on_demand_x_count|ec2_spot_f_count|ec2_
                                   spot_g_count|ec2_spot_inf_count|ec2_spot_p_coun
                                   t|ec2_spot_standard_count|ec2_spot_x_count|ec2_
                                   tgw_count|ec2_vpn_connection_count|ecs_count|ek
                                   s_count|elasticbeanstalk_application_count|elas
                                   ticbeanstalk_environment_count|elb_alb_count|el
                                   b_clb_count|elb_listeners_per_alb|elb_listeners
                                   _per_clb|elb_listeners_per_nlb|elb_nlb_count|el
                                   b_target_group_count|iam_attached_policy_per_gr
                                   oup|iam_attached_policy_per_role|iam_attached_p
                                   olicy_per_user|iam_group_count|iam_policy_count
                                   |iam_policy_version_count|iam_server_certificat
                                   e_count|iam_user_count|ig_count|lc_count|ni_cou
                                   nt|route53_health_check_count|route53_hosted_zo
                                   ne_count|route53_records_per_hosted_zone|route5
                                   3_reusable_delegation_set_count|route53_traffic
                                   _policy_count|route53_traffic_policy_instance_c
                                   ount|route53_vpcs_per_hosted_zone|route53resolv
                                   er_endpoint_count|route53resolver_rule_associat
                                   ion_count|route53resolver_rule_count|s3_bucket_
                                   count|secretsmanager_secrets_count|sg_count|sns
                                   _pending_subscriptions_count|sns_subscriptions_
                                   per_topic|sns_topics_count|vpc_acls_per_vpc|vpc
                                   _count|vpc_subnets_per_vpc]
    Try 'aws-quota-checker check --help' for help.
    
    Error: Invalid value for '[all|am_mesh_count|asg_count|cf_stack_count|cw_alarm_count|dyndb_table_count|ebs_snapshot_count|ec2_eip_count|ec2_on_demand_f_count|ec2_on_demand_g_count|ec2_on_demand_inf_count|ec2_on_demand_p_count|ec2_on_demand_standard_count|ec2_on_demand_x_count|ec2_spot_f_count|ec2_spot_g_count|ec2_spot_inf_count|ec2_spot_p_count|ec2_spot_standard_count|ec2_spot_x_count|ec2_tgw_count|ec2_vpn_connection_count|ecs_count|eks_count|elasticbeanstalk_application_count|elasticbeanstalk_environment_count|elb_alb_count|elb_clb_count|elb_listeners_per_alb|elb_listeners_per_clb|elb_listeners_per_nlb|elb_nlb_count|elb_target_group_count|iam_attached_policy_per_group|iam_attached_policy_per_role|iam_attached_policy_per_user|iam_group_count|iam_policy_count|iam_policy_version_count|iam_server_certificate_count|iam_user_count|ig_count|lc_count|ni_count|route53_health_check_count|route53_hosted_zone_count|route53_records_per_hosted_zone|route53_reusable_delegation_set_count|route53_traffic_policy_count|route53_traffic_policy_instance_count|route53_vpcs_per_hosted_zone|route53resolver_endpoint_count|route53resolver_rule_association_count|route53resolver_rule_count|s3_bucket_count|secretsmanager_secrets_count|sg_count|sns_pending_subscriptions_count|sns_subscriptions_per_topic|sns_topics_count|vpc_acls_per_vpc|vpc_count|vpc_subnets_per_vpc]': invalid choice: all,!vpc_count. (choose from all, am_mesh_count, asg_count, cf_stack_count, cw_alarm_count, dyndb_table_count, ebs_snapshot_count, ec2_eip_count, ec2_on_demand_f_count, ec2_on_demand_g_count, ec2_on_demand_inf_count, ec2_on_demand_p_count, ec2_on_demand_standard_count, ec2_on_demand_x_count, ec2_spot_f_count, ec2_spot_g_count, ec2_spot_inf_count, ec2_spot_p_count, ec2_spot_standard_count, ec2_spot_x_count, ec2_tgw_count, ec2_vpn_connection_count, ecs_count, eks_count, elasticbeanstalk_application_count, elasticbeanstalk_environment_count, elb_alb_count, elb_clb_count, elb_listeners_per_alb, elb_listeners_per_clb, elb_listeners_per_nlb, elb_nlb_count, elb_target_group_count, iam_attached_policy_per_group, iam_attached_policy_per_role, iam_attached_policy_per_user, iam_group_count, iam_policy_count, iam_policy_version_count, iam_server_certificate_count, iam_user_count, ig_count, lc_count, ni_count, route53_health_check_count, route53_hosted_zone_count, route53_records_per_hosted_zone, route53_reusable_delegation_set_count, route53_traffic_policy_count, route53_traffic_policy_instance_count, route53_vpcs_per_hosted_zone, route53resolver_endpoint_count, route53resolver_rule_association_count, route53resolver_rule_count, s3_bucket_count, secretsmanager_secrets_count, sg_count, sns_pending_subscriptions_count, sns_subscriptions_per_topic, sns_topics_count, vpc_acls_per_vpc, vpc_count, vpc_subnets_per_vpc)
    
    

    Expected output (1.2.0):

    (aws-quota-checker) [(HEAD detached at 1.2.0)] aws-quota-checker $ aws-quota-checker check 'all,!vpc_count'
    AWS profile: default | AWS region: None | Active checks: am_mesh_count,asg_count,cf_stack_count,cw_alarm_count,dyndb_table_count,ebs_snapshot_count,ec2_eip_count,ec2_on_demand_f_count,ec2_on_demand_g_count,ec2_on_demand_inf_count,ec2_on_demand_p_count,ec2_on_demand_standard_count,ec2_on_demand_x_count,ec2_spot_f_count,ec2_spot_g_count,ec2_spot_inf_count,ec2_spot_p_count,ec2_spot_standard_count,ec2_spot_x_count,ec2_tgw_count,ec2_vpn_connection_count,ecs_count,eks_count,elasticbeanstalk_application_count,elasticbeanstalk_environment_count,elb_alb_count,elb_clb_count,elb_listeners_per_alb,elb_listeners_per_clb,elb_listeners_per_nlb,elb_nlb_count,elb_target_group_count,iam_attached_policy_per_group,iam_attached_policy_per_role,iam_attached_policy_per_user,iam_group_count,iam_policy_count,iam_policy_version_count,iam_server_certificate_count,iam_user_count,ig_count,lc_count,ni_count,route53_health_check_count,route53_hosted_zone_count,route53_records_per_hosted_zone,route53_reusable_delegation_set_count,route53_traffic_policy_count,route53_traffic_policy_instance_count,route53_vpcs_per_hosted_zone,route53resolver_endpoint_count,route53resolver_rule_association_count,route53resolver_rule_count,s3_bucket_count,secretsmanager_secrets_count,sg_count,sns_pending_subscriptions_count,sns_subscriptions_per_topic,sns_topics_count,vpc_acls_per_vpc,vpc_subnets_per_vpc
    
    opened by philof 1
  • Add vpc endpoint and nat gateways checks.

    Add vpc endpoint and nat gateways checks.

    Add two more checks at vpc check.

    AWS profile: default | AWS region: us-west-2 | Active checks: nat_count
    Collecting checks  [####################################]  100%
    NAT gateways per Region [XXXXXXX/us-west-2]: 60/90 ✓
    
    AWS profile: default | AWS region: eu-west-2 | Active checks: vpc_endpoint
    Collecting checks  [####################################]  100%
    Gateway VPC endpoints per Region [XXXXXXX/eu-west-2]: 1/20 ✓
    ``
    opened by ppanagiotis 0
  • Build for MacM1

    Build for MacM1

    Would love to use this locally, however the Docker image is not build for linux/arm64/v8

    WARNING: The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested
    

    Probably https://github.com/marketplace/actions/build-and-push-docker-images will help as the following ran fine

    docker buildx build --platform=linux/arm/v8 -t aws-quota-checker:macm1 .
    
    opened by mavogel 0
  • How to check more than one region at the same time?

    How to check more than one region at the same time?

    I configured the quota check with my prometheus, but it only brings me the default region of aws configure, but I need it to bring sa-east-1 and us-east-1, could you help me?

    opened by ericosuporte 0
  • Avoid TooManyRequestsException using backoff

    Avoid TooManyRequestsException using backoff

    Adds backoff package to avoid TooManyRequestsException happened with high-rated requests. https://docs.aws.amazon.com/servicequotas/2019-06-24/apireference/API_GetServiceQuota.html Now there are retries:

    12-Apr-22 16:57:04 [INFO] aws_quota.prometheus - starting /metrics endpoint on port 8080
    12-Apr-22 16:57:04 [INFO] aws_quota.prometheus - collecting checks
    12-Apr-22 16:57:22 [INFO] aws_quota.prometheus - collected 746 checks
    12-Apr-22 16:57:22 [INFO] aws_quota.prometheus - refreshing limits
    12-Apr-22 16:57:39 [INFO] backoff - Backing off _maximum(...) for 0.3s (botocore.errorfactory.TooManyRequestsException: An error occurred (TooManyRequestsException) when calling the GetServiceQuota operation: Rate exceeded)
    12-Apr-22 16:57:41 [INFO] backoff - Backing off _maximum(...) for 0.6s (botocore.errorfactory.TooManyRequestsException: An error occurred (TooManyRequestsException) when calling the GetServiceQuota operation: Rate exceeded)
    

    In addition I add traceback to logs when error still happens.

    opened by velom 1
  • CloudFormation stack count doesn't return full count

    CloudFormation stack count doesn't return full count

    Version: aws-quota-checker==1.12.0

    when running

    aws-quota-checker check cf_stack_count --profile tools --region $region
    

    I'm seeing a maximum of 100 returned for regions that have more than 100 stacks. I suspect this is some kind of paging issue.

    opened by Graham42 1
Releases(1.12.0)
  • 1.12.0(Jan 14, 2022)

  • 1.11.0(Jan 10, 2022)

  • 1.10.0(Jan 6, 2022)

    Changelog

    Added

    • add error handling for CLI result reporter
    • new check: iam_role_count
    • Prometheus metrics now have a new label that contains the quota key, see #31 for further details
    Source code(tar.gz)
    Source code(zip)
  • 1.9.0(Sep 21, 2021)

  • 1.8.0(Sep 10, 2021)

    Changelog

    Added

    • new check: rds_instances
    • new check: rds_parameter_groups
    • new check: rds_cluster_parameter_groups

    Fixed

    • iterator bug that prevented check-instance command to function

    Security

    • update several dependencies
    Source code(tar.gz)
    Source code(zip)
  • 1.7.0(May 5, 2021)

  • 1.6.0(Apr 30, 2021)

  • 1.5.0(Apr 19, 2021)

  • 1.4.1(Mar 25, 2021)

  • 1.4.0(Mar 21, 2021)

    Changelog

    Added

    • new check: vpc_rules_per_acl
    • new check: vpc_ipv4_cidr_blocks_per_vpc
    • new check: vpc_ipv6_cidr_blocks_per_vpc
    • new check: vpc_rules_per_sg
    • new check: vpc_route_tables_per_vpc
    • new check: vpc_routes_per_route_table
    • add Grafana dashboard: on-demand-ec2
    • new Prometheus metric that will expose the time it took to get the current/max value of each check
    Source code(tar.gz)
    Source code(zip)
  • 1.3.1(Mar 17, 2021)

  • 1.3.0(Mar 12, 2021)

    Changelog

    Added

    • now available as a Docker image, give it a try with docker run ghcr.io/brennerm/aws-quota-checker:latest
    • improve autocompletion support
    Source code(tar.gz)
    Source code(zip)
  • 1.2.0(Mar 9, 2021)

    Changelog

    Added

    • implement Prometheus exporter that provides access to all quota results

    Changed

    • display AWS account ID instead of profile name in check scope
    Source code(tar.gz)
    Source code(zip)
  • 1.1.0(Feb 27, 2021)

    Changelog

    Added

    • new check: ec2_on_demand_f_count
    • new check: ec2_on_demand_g_count
    • new check: ec2_on_demand_p_count
    • new check: ec2_on_demand_x_count
    • new check: ec2_on_demand_inf_count
    • new check: ec2_spot_f_count
    • new check: ec2_spot_g_count
    • new check: ec2_spot_p_count
    • new check: ec2_spot_x_count
    • new check: ec2_spot_inf_count
    • new check: sns_topics_count
    • new check: sns_pending_subscriptions_count
    • new check: sns_subscriptions_per_topic

    Changed

    • sort checks alphabetically by key
    Source code(tar.gz)
    Source code(zip)
  • 1.0.0(Feb 24, 2021)

A delightful and complete interface to GitHub's amazing API

ghapi A delightful and complete interface to GitHub's amazing API ghapi provides 100% always-updated coverage of the entire GitHub API. Because we aut

fast.ai 428 Jan 08, 2023
Wechat based auto reply with pyautogui

Python-微信 自动回复 练手~ 一直想做个给微信发个消息,就可以跑Python程序,并将结果发送给我的东西,之前看了 B站@不高兴就喝水 的视频,终于有了灵感~ 使用的是模拟点击方案,请求期间是不能操作了。 库 pyautogui 用于模拟鼠标键盘操作和定位操作位置 pyperclip 剪贴板

Vito Song 1 Oct 22, 2022
Recommendation systems are among most widely preffered marketing strategies.

Recommendation systems are among most widely preffered marketing strategies. Their popularity comes from close prediction scores obtained from relationships of users and items. In this project, two r

Sübeyte 8 Oct 06, 2021
Python-based Snapchat score booster using pyautogui module

Snapchat Snapscore Botter Python-based Snapchat score booster using pyautogui module. Click here to report bugs. Usage Download ZIP here and extract t

477 Dec 31, 2022
A python bot that stops muck chains

muck-chains-stopper-bot a bot that stops muck chains this is the source code of u/DaniDevChainBreaker (the main r/DaniDev muck chains breaker) guys th

24 Jan 04, 2023
Simple Discord Nuke Bot.

Discord-Nuke-Bot Simple Discord Nuke Bot. Simple Discord Nuke Bot Python 3.6 - 3.8 Features Delete Channels Ban All Members Delete Roles Create Channe

9X4N 6 Aug 16, 2022
Extrait les informations contenues dans le code QR de la preuve de vaccination générée par le gouvernement du Québec

DecodeurPreuveVaccinationQC Extrait les informations contenues dans le code QR de la preuve de vaccination générée par le gouvernement du Québec Utili

Guillaume Morissette 8 Jul 26, 2022
SOLSEA-NFT-EXPLORE - Using Streamlit to build a simple UI on top of the Solana API

SOLSEA NFT Explorer Using Streamlit to build a simple UI on top of the Solana AP

Devin Capriola 3 Mar 19, 2022
A Python wrapper for Discord RPC API

Discord RPC An Python wrapper for Discord RPC API. Allow you to make own custom RPC Install PyPI pip install discord-rpc Quick example import Discord

LyQuid :3 10 Dec 29, 2022
a small cli to generate AWS Well Architected Reports on the road

well-architected-review This repo intends to publish some scripts related to Well Architected Reviews. war.py extracts in txt & xlsx files all the WAR

4 Mar 18, 2022
🔮 Uncover some followers of a private instagram account

Private Instagram Chaining 🔮 Uncover part of followers of an instagram private account I have this private instagram account julianakhao. I need to g

аэт 69 Dec 17, 2022
A discord Server Bot made with Python, This bot helps people feel better by inspiring them with motivational quotes or by responding with a great message, also the users of the server can create custom messages by telling the bot with Commands.

A discord Server Bot made with Python, This bot helps people feel better by inspiring them with motivational quotes or by responding with a great message, also the users of the server can create cust

Aran 1 Oct 13, 2021
D(HE)ater is a security tool can perform DoS attack by enforcing the DHE key exchange.

D(HE)ater D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of Diffie-Hellman key exchange (DHE) in given cr

Balasys 138 Dec 15, 2022
Want to play What Would Rather on your Server? Invite the bot now! 😏

What is this Bot? 👀 What You Would Rather? is a Guessing game where you guess one thing. Long Description short Take this example: You typed r!rather

FSP Gang s' YT 3 Oct 18, 2021
News API consisting various sources from Tanzania

Tanzania News API News API consisting various sources from Tanzania. Fork the project Clone the project git clone https://github.com/username/news-a

Innocent Zenda 6 Oct 06, 2022
This wrapper now has async support, its basically the same except it uses asyncio

This is a python wrapper for my api api_url = "https://api.dhravya.me/" This wrapper now has async support, its basically the same except it uses asyn

Dhravya Shah 5 Mar 10, 2022
Code for generating Tiktok X-Gorgon, X-Khronos and etc. parameters

TikTok-Algorithm I found this python file from a source which was later deleted. Although the test api functions no longer seem to work, surprisingly

0 Dec 09, 2021
Free python/telegram bot for easy execution and surveillance of crypto trading plans on multiple exchanges.

EazeBot Introduction Have you ever traded cryptocurrencies and lost overview of your planned buys/sells? Have you encountered the experience that your

Marcel Beining 100 Dec 06, 2022
A python script to download twitter space, only works on running spaces (for now).

A python script to download twitter space, only works on running spaces (for now).

279 Jan 02, 2023
Projeto do segundo módulo da Resilia

@ Projeto Resilia : Módulo 2 Vamos jogar Forca ! O jogo da forca é um jogo em que o jogador tem que acertar qual é a palavra proposta, tendo como dica

Mateus Sartorio 2 Feb 24, 2022