Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked aws security tools


D4rkn3S

Recommended Posts

hello guys, here is github link of AWS security tools

 

Spoiler

Defensive (Hardening, Security Assessment, Inventory)

Scout2:

This is the hidden content, please
- Security auditing tool for AWS environments (Python)
Prowler:
This is the hidden content, please
- CIS benchmarks and additional checks for security best practices in AWS (Shell Script)
Scans:
This is the hidden content, please
- AWS security scanning checks (NodeJS)
CloudMapper:
This is the hidden content, please
- helps you analyze your AWS environments (Python)
CloudTracker:
This is the hidden content, please
- helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python)
AWS Security Benchmarks:
This is the hidden content, please
- scrips and templates guidance related to the AWS CIS Foundation framework (Python)
AWS Public IPs:
This is the hidden content, please
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services (Ruby)
PMapper:
This is the hidden content, please
- Advanced and Automated AWS IAM Evaluation (Python)
AWS-Inventory:
This is the hidden content, please
- Make a inventory of all your resources across regions (Python)
Resource Counter:
This is the hidden content, please
- Counts number of resources in categories across regions
ICE:
This is the hidden content, please
- Ice provides insights from a usage and cost perspective, with high detail dashboards.
SkyArk:
This is the hidden content, please
- SkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS.
Offensive:

weirdALL:

This is the hidden content, please
- AWS Attack Library
Pacu:
This is the hidden content, please
- AWS penetration testing toolkit
Cred Scanner:
This is the hidden content, please

AWS PWN:
This is the hidden content, please

Cloudfrunt:
This is the hidden content, please

Cloudjack:
This is the hidden content, please

Nimbostratus:
This is the hidden content, please

Continuous Security Auditing:

Security Monkey:

This is the hidden content, please

Krampus (as Security Monkey complement)
This is the hidden content, please

Cloud Inquisitor:
This is the hidden content, please

CloudCustodian:
This is the hidden content, please

Disable keys after X days:
This is the hidden content, please

Repokid Least Privilege:
This is the hidden content, please

Wazuh CloudTrail module:
This is the hidden content, please

Hammer:
This is the hidden content, please

Streamalert:
This is the hidden content, please

DFIR:

AWS IR:

This is the hidden content, please
- AWS specific Incident Response and Forensics Tool
Margaritashotgun:
This is the hidden content, please
- Linux memory remote acquisition tool
LiMEaide:
This is the hidden content, please
- Linux memory remote acquisition tool
Diffy:
This is the hidden content, please
- Triage tool used during cloud-centric security incidents
Development Security:

CFN NAG:

This is the hidden content, please
- CloudFormation security test (Ruby)
Git-secrets:
This is the hidden content, please

Repository of sample Custom Rules for AWS Config:
This is the hidden content, please

S3 Buckets Auditing:

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please
|
This is the hidden content, please
  [Currently Offline]
This is the hidden content, please

Training:

This is the hidden content, please

Others:

This is the hidden content, please
- a list of some biggest leaks recorded

 

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.