prowler-cloud / prowlerLinks
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more
☆12,420Updated this week
Alternatives and similar repositories for prowler
Users that are interested in prowler are comparing it to the libraries listed below
Sorting:
- Multi-Cloud Security Auditing Tool☆7,455Updated 2 months ago
- Cloud Security Posture Management (CSPM)☆3,644Updated last week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,349Updated last month
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,986Updated last month
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,396Updated 3 weeks ago
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,197Updated 2 weeks ago
- Tfsec is now part of Trivy☆6,932Updated 3 weeks ago
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,864Updated this week
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,237Updated last year
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,157Updated this week
- Automating situational awareness for cloud penetration tests.☆2,253Updated 3 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,209Updated 2 weeks ago
- Ultimate DevSecOps library☆6,489Updated 4 months ago
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,640Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆1,529Updated last year
- Zero-ETL, infinite possibilities. Live query APIs, code & more with SQL. No DB required.☆7,608Updated 2 weeks ago
- Hunt for security weaknesses in Kubernetes clusters☆4,969Updated last year
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,298Updated 2 weeks ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,381Updated last month
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,020Updated 11 months ago
- A vulnerability scanner for container images and filesystems☆11,088Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,534Updated this week
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,827Updated last week
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆5,192Updated last year
- Find, verify, and analyze leaked credentials☆23,660Updated this week
- Open-source cloud-environment inspector. Supporting AWS, GCP, Azure, and more! Your cloud resources will have nowhere to hide!☆4,089Updated 2 months ago
- An enterprise friendly way of detecting and preventing secrets in code.☆4,324Updated 8 months ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆30,012Updated last week
- IAM Least Privilege Policy Generator☆2,121Updated this week
- Terraform module to create Amazon Elastic Kubernetes (EKS) resources 🇺🇦☆4,848Updated last week