Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      D4rkn3S

      aws security tools

      1 post in this topic

      hello guys, here is github link of AWS security tools

       

      Spoiler

      Defensive (Hardening, Security Assessment, Inventory)

      Scout2:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Security auditing tool for AWS environments (Python)
      Prowler:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - CIS benchmarks and additional checks for security best practices in AWS (Shell Script)
      Scans:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS security scanning checks (NodeJS)
      CloudMapper:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - helps you analyze your AWS environments (Python)
      CloudTracker:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python)
      AWS Security Benchmarks:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - scrips and templates guidance related to the AWS CIS Foundation framework (Python)
      AWS Public IPs:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services (Ruby)
      PMapper:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Advanced and Automated AWS IAM Evaluation (Python)
      AWS-Inventory:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Make a inventory of all your resources across regions (Python)
      Resource Counter:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Counts number of resources in categories across regions
      ICE:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Ice provides insights from a usage and cost perspective, with high detail dashboards.
      SkyArk:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - SkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS.
      Offensive:

      weirdALL:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS Attack Library
      Pacu:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS penetration testing toolkit
      Cred Scanner:

      Hidden Content

        Give reaction to this post to see the hidden content.

      AWS PWN:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloudfrunt:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloudjack:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Nimbostratus:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Continuous Security Auditing:

      Security Monkey:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Krampus (as Security Monkey complement)

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloud Inquisitor:

      Hidden Content

        Give reaction to this post to see the hidden content.

      CloudCustodian:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Disable keys after X days:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Repokid Least Privilege:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Wazuh CloudTrail module:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hammer:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Streamalert:

      Hidden Content

        Give reaction to this post to see the hidden content.

      DFIR:

      AWS IR:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS specific Incident Response and Forensics Tool
      Margaritashotgun:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Linux memory remote acquisition tool
      LiMEaide:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Linux memory remote acquisition tool
      Diffy:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Triage tool used during cloud-centric security incidents
      Development Security:

      CFN NAG:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - CloudFormation security test (Ruby)
      Git-secrets:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Repository of sample Custom Rules for AWS Config:

      Hidden Content

        Give reaction to this post to see the hidden content.

      S3 Buckets Auditing:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.
      |

      Hidden Content

        Give reaction to this post to see the hidden content.
        [Currently Offline]

      Hidden Content

        Give reaction to this post to see the hidden content.

      Training:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Others:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - a list of some biggest leaks recorded

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 7

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Parrot Security OS is a security-oriented operating system, which is designed for infiltration testing, computer forensics, reverse engineering, attack, cloud penetration testing, privacy / anonymous, password, and other occasions. The release is based on Debian, which features the MATE desktop environment and developed by the Frozen box network.
          Lorenzo Faletra announces the release of Parrot Security OS 4.7, a security-oriented operating system designed for penetration testing, computer forensics, reverse engineering, attacks, cloud penetration testing, privacy/anonymity, passwords and more. The distribution is based on Debian, which features the MATE desktop environment and was developed by the Frozen box network.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The #1 solution to secure your WP Website from most common attacks. Hide my WP prevent people and bots to know your site runs on wordpress.
          Demo:
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Reverie
          Automated Pentest Tools Designed For Parrot Linux
          this tool will make your basic pentesting task like Information Gathering, Security Auditing, And Reporting so this tool will do every task fully automatic.

          Pentest Tools Auto Executed With Reverie
              Whois Lookup     DNSwalk     Nmap     Dmitry     Whatweb     wafw00f     Load Balancing Detector     SSLyze     TLSSled     Automater     Nikto     And More Tool Soon
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          PowerShell Pro Tools is the name of an add-on for Visual Studio that adds the PowerShell framework features to the Visual Studio Code Editor to make the coding process easier for users. This add-on does not allow other users to edit the code by providing a single package file and simply provides code execution. With this plugin you can use an attractive interface to write scripts, and without worrying about the command line, you can run any section of the code you want to easily run.
          PowerShell Pro Tools allows you Snippets from #C to convert PowerShell, PowerShell scripts to evaluate performance, and simply loops, commands cmdlet, and functions to detect slow. Adding a design interface will help you create forms without the need for coding, drag and drop, and create a package of executable scripts and XAML files.
           
          The PowerShell Pro Tools for Visual Studio 2017 add enhanced features to your PowerShell editing experience in Visual Studio. 
          Features:
          PowerShell Forms Designer PowerShell WPF Designer Support Package as Executable Convert between PowerShell and C#  

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Kali Linux Tools Interface
          It is a graphical interface to use information security tools by the browser. The project uses the Kali Linux tools as a reference because it is the distribution that has the largest package of native tools.
          Prerequisites
          A Debian-based distribution (preferably Kali Linux) The information security tools installed Apache / Nginx service running SSH Service running Shell In A Box (if you want to use the Terminal) To install Shell In A Box, use the following command: sudo apt-get install shellinabox

          Hidden Content
          Give reaction to this post to see the hidden content.  

          Hidden Content
          Give reaction to this post to see the hidden content.