Security auditing tool for AWS environments
☆1,723Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for Scout2
Users that are interested in Scout2 are comparing it to the libraries listed below
Sorting:
- A number of Recipes for AWS☆192Apr 26, 2019Updated 6 years ago
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,369Feb 11, 2021Updated 5 years ago
- Google Cloud Platform Security Tool☆235Jul 30, 2019Updated 6 years ago
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- AWS Auditing & Hardening Tool☆713Feb 4, 2020Updated 6 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,273Jul 15, 2024Updated last year
- Cloud Security Posture Management (CSPM)☆3,717Feb 23, 2026Updated last month
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,947Updated this week
- Multi-Cloud Security Auditing Tool☆7,579Sep 23, 2025Updated 5 months ago
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,344Updated this week
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆620Jan 16, 2020Updated 6 years ago
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,148Nov 24, 2025Updated 3 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,414Oct 16, 2025Updated 5 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆908Dec 17, 2021Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year
- Reconnaissance tool for GitHub organizations☆6,147Sep 20, 2022Updated 3 years ago
- Enforce ownership and data security within AWS☆446Oct 7, 2020Updated 5 years ago
- Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function☆2,759Aug 16, 2024Updated last year
- Discover resources created in an AWS account.☆736Apr 5, 2024Updated last year
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- WeirdAAL (AWS Attack Library)☆838Jan 13, 2025Updated last year
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,458Apr 10, 2024Updated last year
- A security toolkit for Amazon S3☆459Dec 20, 2025Updated 3 months ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆498Nov 10, 2022Updated 3 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆483Oct 25, 2024Updated last year
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆635Jan 14, 2026Updated 2 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Exploits written by the Rhino Security Labs team☆1,096Jan 23, 2021Updated 5 years ago
- Vulnerability Static Analysis for Containers☆10,945Updated this week
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Visualize your aws security groups.☆722Apr 7, 2025Updated 11 months ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Jul 23, 2021Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆362Jun 24, 2020Updated 5 years ago
- PacBot (Policy as Code Bot)☆1,307Dec 8, 2022Updated 3 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,802Feb 28, 2025Updated last year
- A tool for auditing security properties of GCP projects.☆160Jun 13, 2018Updated 7 years ago
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,197Updated this week