ScoutSuite
heimdall2
Our great sponsors
ScoutSuite | heimdall2 | |
---|---|---|
24 | 4 | |
6,132 | 192 | |
1.6% | 2.1% | |
6.1 | 9.9 | |
7 days ago | 7 days ago | |
Python | TypeScript | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ScoutSuite
-
Azure and M365 Secure Config Review
Prowler and ScoutSuite are a good start for cloud stuff.
-
Open source alternative cloud security tool that works like Wiz/Lacework/Aqua
Another solution might be ScoutSuite, they have support for all major clouds - aws,gcp and azure. But its probably not maintained as well. ScoutSuite
- CSPM opensource suggestions
-
Creating a jump host in 2023
If you're planning to use Active Directory and/or Azure AD, run ADRecon/AzureADRecon and Bloodhound frequently and review in depth. Run ScoutSuite frequently and review as part of a normal operational cycle (e.g., at weekly team meetings make the results available and set aside 15 minutes to discuss and make assignments). Look critically at where these three tools overlap within two or three degrees of separation from your jump hosts (e.g., hosts/nodes that are one or two devices away and users/security groups that are one or two devices away) for help prioritizing when you have too many high-risk/high-impact items to look through.
-
How to do AWS security assesment?
https://github.com/nccgroup/ScoutSuite (I used it for GCP one time, but I can't say if it good for AWS)
- Scanning for AWS Security Issues with Trivy
-
Automated penetration testing for a cloud infrastructure
I'd take a look at ScoutSuite. It runs on your infra and spits back a remarkably readable report.
- Pentesting
-
AWS Security Checklist
If you could get a read-only (audit?) account you could use ScoutSuite to pull the accounts and review them: https://github.com/nccgroup/ScoutSuite
-
This Week in Python
ScoutSuite – Multi-Cloud Security Auditing Tool
heimdall2
- CSPM opensource suggestions
-
CIS Benchmark deployment approach
Take a look at https://github.com/mitre/heimdall2 and https://github.com/mitre/saf. Data from scans and other tools can be converted to the Heimdall2 format using SAF, and SAF can use Inspec profiles to harden (https://saf.mitre.org/#/harden) and validate (https://saf.mitre.org/#/validate).
- Tooling for Purple Teaming
- Checking compliance of controls? Job help
What are some alternatives?
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
OSCAL - Open Security Controls Assessment Language (OSCAL)
cloudsploit - Cloud Security Posture Management (CSPM)
inspec - InSpec: Auditing and Testing Framework
Scout2 - Security auditing tool for AWS environments
saf - The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
attack-stix-data - STIX data representing MITRE ATT&CK
kubestriker - A Blazing fast Security Auditing tool for Kubernetes
macos_security - macOS Security Compliance Project
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources