ScoutSuite
magpie
ScoutSuite | magpie | |
---|---|---|
24 | 4 | |
6,176 | 159 | |
1.2% | 3.1% | |
4.9 | 8.3 | |
13 days ago | 12 days ago | |
Python | Java | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ScoutSuite
-
Azure and M365 Secure Config Review
Prowler and ScoutSuite are a good start for cloud stuff.
-
Open source alternative cloud security tool that works like Wiz/Lacework/Aqua
Another solution might be ScoutSuite, they have support for all major clouds - aws,gcp and azure. But its probably not maintained as well. ScoutSuite
- CSPM opensource suggestions
-
Creating a jump host in 2023
If you're planning to use Active Directory and/or Azure AD, run ADRecon/AzureADRecon and Bloodhound frequently and review in depth. Run ScoutSuite frequently and review as part of a normal operational cycle (e.g., at weekly team meetings make the results available and set aside 15 minutes to discuss and make assignments). Look critically at where these three tools overlap within two or three degrees of separation from your jump hosts (e.g., hosts/nodes that are one or two devices away and users/security groups that are one or two devices away) for help prioritizing when you have too many high-risk/high-impact items to look through.
-
How to do AWS security assesment?
https://github.com/nccgroup/ScoutSuite (I used it for GCP one time, but I can't say if it good for AWS)
- Scanning for AWS Security Issues with Trivy
-
Automated penetration testing for a cloud infrastructure
I'd take a look at ScoutSuite. It runs on your infra and spits back a remarkably readable report.
- Pentesting
-
AWS Security Checklist
If you could get a read-only (audit?) account you could use ScoutSuite to pull the accounts and review them: https://github.com/nccgroup/ScoutSuite
-
This Week in Python
ScoutSuite – Multi-Cloud Security Auditing Tool
magpie
-
Cloud asset tracking
There both do something like what you're looking for.... https://github.com/cloudquery/cloudquery https://github.com/openraven/magpie
-
CSPM opensource suggestions
Magpie https://github.com/openraven/magpie ThreatMapper https://github.com/deepfence/ThreatMapper Cloudquery https://github.com/cloudquery/cloudquery
- Magpie – OSS CSPM and non-native service enumeration
- Magpie – Open-Source CSPM
What are some alternatives?
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
cloudsploit - Cloud Security Posture Management (CSPM)
saf - The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
Scout2 - Security auditing tool for AWS environments
jit-access - Just-In-Time Access is a self-service web application that lets you manage just-in-time privileged access to Google Cloud projects. JIT Access runs on App Engine and Cloud Run.
pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
ZAP - The ZAP core project
kubestriker - A Blazing fast Security Auditing tool for Kubernetes
cloudquery - The open source high performance ELT framework powered by Apache Arrow
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources