prowler
ScoutSuite
prowler | ScoutSuite | |
---|---|---|
1 | 24 | |
7,019 | 6,191 | |
- | 1.5% | |
10.0 | 4.9 | |
over 1 year ago | 6 days ago | |
Shell | Python | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
prowler
-
How to do AWS security assesment?
https://github.com/toniblyx/prowle (it's look like huge checklist)
ScoutSuite
-
Azure and M365 Secure Config Review
Prowler and ScoutSuite are a good start for cloud stuff.
-
Open source alternative cloud security tool that works like Wiz/Lacework/Aqua
Another solution might be ScoutSuite, they have support for all major clouds - aws,gcp and azure. But its probably not maintained as well. ScoutSuite
- CSPM opensource suggestions
-
Creating a jump host in 2023
If you're planning to use Active Directory and/or Azure AD, run ADRecon/AzureADRecon and Bloodhound frequently and review in depth. Run ScoutSuite frequently and review as part of a normal operational cycle (e.g., at weekly team meetings make the results available and set aside 15 minutes to discuss and make assignments). Look critically at where these three tools overlap within two or three degrees of separation from your jump hosts (e.g., hosts/nodes that are one or two devices away and users/security groups that are one or two devices away) for help prioritizing when you have too many high-risk/high-impact items to look through.
-
How to do AWS security assesment?
https://github.com/nccgroup/ScoutSuite (I used it for GCP one time, but I can't say if it good for AWS)
- Scanning for AWS Security Issues with Trivy
-
Automated penetration testing for a cloud infrastructure
I'd take a look at ScoutSuite. It runs on your infra and spits back a remarkably readable report.
- Pentesting
-
AWS Security Checklist
If you could get a read-only (audit?) account you could use ScoutSuite to pull the accounts and review them: https://github.com/nccgroup/ScoutSuite
-
This Week in Python
ScoutSuite – Multi-Cloud Security Auditing Tool
What are some alternatives?
bucketeer - Bucketeer is a small script that builds off the useful Sublist3r tool. The Tool tries to identify S3 Buckets and other useful subdomain information, that is used to perform subdomain takeover attacks.
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
git-landmine - create local malicious git repo
cloudsploit - Cloud Security Posture Management (CSPM)
yatas - :owl::mag_right: A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
Scout2 - Security auditing tool for AWS environments
s3audit-ts - CLI tool for auditing S3 buckets
pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
cloudtrail-event-fuzzy-viewer - cli tool for searching cloudtrail events using fuzzy search
kubestriker - A Blazing fast Security Auditing tool for Kubernetes
og-aws - 📙 Amazon Web Services — a practical guide
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources