iSECPartners / scout
AWS EC2 and S3 Security Auditing Tool
☆41Updated 11 years ago
Alternatives and similar repositories for scout:
Users that are interested in scout are comparing it to the libraries listed below
- Websocket based egress tester☆20Updated 8 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- ☆32Updated 11 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆22Updated 8 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- ☆50Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Collection of information security policies.☆29Updated 7 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆43Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- first commit☆20Updated last year