nccgroup / Scout2Links
Security auditing tool for AWS environments
☆1,728Updated 7 years ago
Alternatives and similar repositories for Scout2
Users that are interested in Scout2 are comparing it to the libraries listed below
Sorting:
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,146Updated last month
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆619Updated 5 years ago
- A collection of AWS penetration testing junk☆1,212Updated 2 years ago
- Visualize your aws security groups.☆722Updated 8 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆902Updated 4 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,163Updated 3 years ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆639Updated 4 years ago
- AWS Auditing & Hardening Tool☆712Updated 5 years ago
- Discover resources created in an AWS account.☆729Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆1,534Updated last year
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,373Updated 4 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆482Updated last year
- PacBot (Policy as Code Bot)☆1,306Updated 3 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆633Updated 4 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆922Updated 6 years ago
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,724Updated last week
- IAM Least Privilege Policy Generator☆2,126Updated last week
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆446Updated 2 years ago
- AWS IAM linting library☆1,100Updated 3 weeks ago
- a ruggedization framework that embodies the principle "be mean to your code"☆995Updated 3 years ago
- This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-…☆908Updated 3 weeks ago
- Enforce ownership and data security within AWS☆445Updated 5 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆494Updated 3 years ago
- This repository contains example scripts and sets of rules for the AWS WAF service. Please be aware that the applicability of these examp…☆511Updated 5 years ago
- Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS F…☆1,191Updated last year
- Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function☆2,757Updated last year
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,166Updated last week
- Manage AWS EC2 SSH access with IAM☆827Updated 3 years ago
- DEPRECATED — assume-role: a CLI tool making it easy to assume IAM roles through an AWS Bastion account☆422Updated 5 years ago