bear / s3scan
scan s3 buckets for security issues
☆83Updated 5 months ago
Alternatives and similar repositories for s3scan:
Users that are interested in s3scan are comparing it to the libraries listed below
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- ☆82Updated 5 years ago
- A number of Recipes for AWS☆194Updated 5 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆18Updated 6 years ago
- The original AWS security enforcer™☆59Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆56Updated 5 years ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- Blazing CloudTrail since 2018☆133Updated 5 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆51Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆63Updated 5 years ago
- Google Cloud Platform Security Tool☆233Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- CLI tool for auditing S3 buckets☆109Updated last year
- AWS CIS Benchmark scanner☆39Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Show the history and changes between configuration versions of AWS resources☆69Updated 5 years ago
- Monitor Host-Based Intrusion Detection System Alerts on Amazon EC2 Instances☆62Updated last year
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 3 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆90Updated 5 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated last year
- Evident Security Platform Custom Signatures Samples☆28Updated 5 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 2 years ago
- Get started with gauntlt right away with examples, install scripts and more☆51Updated 9 years ago
- it-security related scripts and tools☆25Updated 5 years ago
- ☆32Updated 10 years ago