Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      D4rkn3S

      aws security tools

      Recommended Posts

      hello guys, here is github link of AWS security tools

       

      Spoiler

      Defensive (Hardening, Security Assessment, Inventory)

      Scout2:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Security auditing tool for AWS environments (Python)
      Prowler:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - CIS benchmarks and additional checks for security best practices in AWS (Shell Script)
      Scans:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS security scanning checks (NodeJS)
      CloudMapper:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - helps you analyze your AWS environments (Python)
      CloudTracker:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python)
      AWS Security Benchmarks:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - scrips and templates guidance related to the AWS CIS Foundation framework (Python)
      AWS Public IPs:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services (Ruby)
      PMapper:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Advanced and Automated AWS IAM Evaluation (Python)
      AWS-Inventory:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Make a inventory of all your resources across regions (Python)
      Resource Counter:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Counts number of resources in categories across regions
      ICE:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Ice provides insights from a usage and cost perspective, with high detail dashboards.
      SkyArk:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - SkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS.
      Offensive:

      weirdALL:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS Attack Library
      Pacu:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS penetration testing toolkit
      Cred Scanner:

      Hidden Content

        Give reaction to this post to see the hidden content.

      AWS PWN:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloudfrunt:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloudjack:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Nimbostratus:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Continuous Security Auditing:

      Security Monkey:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Krampus (as Security Monkey complement)

      Hidden Content

        Give reaction to this post to see the hidden content.

      Cloud Inquisitor:

      Hidden Content

        Give reaction to this post to see the hidden content.

      CloudCustodian:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Disable keys after X days:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Repokid Least Privilege:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Wazuh CloudTrail module:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hammer:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Streamalert:

      Hidden Content

        Give reaction to this post to see the hidden content.

      DFIR:

      AWS IR:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - AWS specific Incident Response and Forensics Tool
      Margaritashotgun:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Linux memory remote acquisition tool
      LiMEaide:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Linux memory remote acquisition tool
      Diffy:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - Triage tool used during cloud-centric security incidents
      Development Security:

      CFN NAG:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - CloudFormation security test (Ruby)
      Git-secrets:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Repository of sample Custom Rules for AWS Config:

      Hidden Content

        Give reaction to this post to see the hidden content.

      S3 Buckets Auditing:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.
      |

      Hidden Content

        Give reaction to this post to see the hidden content.
        [Currently Offline]

      Hidden Content

        Give reaction to this post to see the hidden content.

      Training:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Others:

      Hidden Content

        Give reaction to this post to see the hidden content.
      - a list of some biggest leaks recorded

       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PwnFox
          PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit.
          If you are a chrome user you can check https://github.com/nccgroup/autochrome.
          Single click BurpProxy
          Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked.
          Containers Profiles
          PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp.
          PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++.
          Security header remover
          Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload.
          Headers stripped:
              Content-Security-Policy
              X-XSS-Protection
              X-Frame-Options
              X-Content-Type-Options


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The Best WordPress Security Plugin to
          Secure & Protect WordPress
          Built by the WordPress security experts
          iThemes Security Pro takes the guesswork out of WordPress security. You shouldn’t have to be a security professional to use a security plugin, so iThemes Security Pro makes it easy to secure & protect your WordPress website.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in waybackmachine.
          Features
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.5.3
               – add setup.sh


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.

          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.2 RC3
              First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools.
              Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include:
               
                  Filtering the hunt query
                  Pivot to PCAP
                  Create an alert in TheHive
                  Google search for the value
                  Analyze the value on VirusTotal.com
              Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer!

          Hidden Content
          Give reaction to this post to see the hidden content.