Skip to content

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

License

Notifications You must be signed in to change notification settings

toniblyx/my-arsenal-of-aws-security-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Table of Contents

Contribute

Do you want to contribute to this list? Feel free to send a PR and make sure your tool is Open Source.

NameDescriptionPopularityMetadata
My Arsenal of AWS Security ToolsThis list of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.starscontributorswatcherslast-commitopen-issuesclosed-issues

Defensive: Hardening, Security Assessment and Inventory

NameDescriptionPopularityMetadata
ProwlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more. (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
CloudMapperhelps you analyze your AWS environments (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
ScoutSuiteMulti-Cloud Security auditing tool for AWS Google Cloud and Azure environments (python)starscontributorswatcherslast-commitopen-issuesclosed-issues
CloudCustodianRules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resourcesstarscontributorswatcherslast-commitopen-issuesclosed-issues
ICEIce provides insights from a usage and cost perspective with high detail dashboards.starscontributorswatcherslast-commitopen-issuesclosed-issues
CloudSploit ScansAWS security scanning checks (NodeJS)starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS Network Access AnalyzerAutomation for Amazon VPC Network Access Analyzer to identify all possible Internet Gateway reachability for your resources across all your AWS accountsstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudTrackerhelps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS Security Benchmarksscripts and templates guidance related to the AWS CIS Foundation framework (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS Public IPsFetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6 Classic/VPC networking and across all AWS services (Ruby)starscontributorswatcherslast-commitopen-issuesclosed-issues
PMapperAdvanced and Automated AWS IAM Evaluation (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
nccgroup AWS-InventoryMake a inventory of all your resources across regions (Python)starscontributorswatcherslast-commitopen-issuesclosed-issues
Resource CounterCounts number of resources in categories across regionsstarscontributorswatcherslast-commitopen-issuesclosed-issues
SkyArkSkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS.starscontributorswatcherslast-commitopen-issuesclosed-issues
findmytakeoverfind dangling domains in a multi cloud environmentstarscontributorswatcherslast-commitopen-issuesclosed-issues
Trailblazer AWSTrailblazer AWS determine what AWS API calls are logged by CloudTrail and what they are logged as. You can also use TrailBlazer as an attack simulation framework.starscontributorswatcherslast-commitopen-issuesclosed-issues
LunarSecurity auditing tool based on several security frameworks (it does some AWS checks)starscontributorswatcherslast-commitopen-issuesclosed-issues
Cloud-reportsScans your AWS cloud resources and generates reportsstarscontributorswatcherslast-commitopen-issuesclosed-issues
PacbotPlatform for continuous compliance monitoring compliance reporting and security automation for the cloudstarscontributorswatcherslast-commitopen-issuesclosed-issues
cs-suiteIntegrates tools like Scout2 and Prowler among othersstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-key-disablerA small lambda script that will disable access keys older than a given amount of daysstarscontributorswatcherslast-commitopen-issuesclosed-issues
AntiopeAWS Inventory and Compliance Frameworkstarscontributorswatcherslast-commitopen-issuesclosed-issues
Cloud ReportsScans your AWS cloud resources and generates reports and includes security best practices.starscontributorswatcherslast-commitopen-issuesclosed-issues
Terraform AWS Secure BaselineTerraform module to set up your AWS account with the securestarscontributorswatcherslast-commitopen-issuesclosed-issues
ZeusCloudDiscover, prioritize, and remediate security risks in your AWS cloud environments.starscontributorswatcherslast-commitopen-issuesclosed-issues
CartographyCartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.starscontributorswatcherslast-commitopen-issuesclosed-issues
TrailScraperA command-line tool to get valuable information out of AWS CloudTrailstarscontributorswatcherslast-commitopen-issuesclosed-issues
KomiserCloud Environment Inspector analyze and manage cloud cost usage security and governance in one place.starscontributorswatcherslast-commitopen-issuesclosed-issues
PerimeteratorAWS perimeter monitoring. Periodically scan internet facing AWS resources to detect misconfigured servicesstarscontributorswatcherslast-commitopen-issuesclosed-issues
PolicySentryIAM Least Privilege Policy Generator auditor and analysis databasestarscontributorswatcherslast-commitopen-issuesclosed-issues
ZeusAWS Auditing & Hardening Toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
janiko71 AWS-inventoryPython script for AWS resources inventorystarscontributorswatcherslast-commitopen-issuesclosed-issues
awspxA graph-based tool for visualizing effective access and resource relationships in AWS environmentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
clinvDevSecOps command line asset inventory toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-gateEnhanced AWS SSM Session manager CLI clientstarscontributorswatcherslast-commitopen-issuesclosed-issues
Detecting Credential CompromiseDetecting of your compromised credential in AWSstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWS-Security-Toolbox (AST)AWS Security Toolbox (Docker Image) for Security Assessmentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
iam-lintGithub action for linting AWS IAM policy documents for correctness and possible security issuesstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-security-vizA tool to visualize aws security groups.starscontributorswatcherslast-commitopen-issuesclosed-issues
AirIAMLeast privilege AWS IAM using Terraformstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudsplainingAWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report.starscontributorswatcherslast-commitopen-issuesclosed-issues
iam-policy-generatorA simple library to generate IAM policy statements with no need to remember all the actions APIsstarscontributorswatcherslast-commitopen-issuesclosed-issues
SkyWrapperSkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWSstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-reconMulti-threaded AWS inventory collection toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
iam-policies-cliA CLI tool for building simple to complex IAM policiesstarscontributorswatcherslast-commitopen-issuesclosed-issues
AaiaAWS Identity and Access Management Visualizer and Anomaly Finderstarscontributorswatcherslast-commitopen-issuesclosed-issues
iam-floydIAM policy statement generator with fluent interface - Available for Node.js, Python, .Net and Javastarscontributorswatcherslast-commitopen-issuesclosed-issues
rpCheckupAWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.starscontributorswatcherslast-commitopen-issuesclosed-issues
S3 Exif CleanerRemove EXIF data from all objects in an S3 bucketstarscontributorswatcherslast-commitopen-issuesclosed-issues
SteampipeUse SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required. (SQL)starscontributorswatcherslast-commitopen-issuesclosed-issues
access-undenied-awsParses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps.starscontributorswatcherslast-commitopen-issuesclosed-issues
MetabadgerPrevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS-Firewall FactoryDeploy, update, and stage your WAFs while managing them centrally via FMS (CDK)starscontributorswatcherslast-commitopen-issuesclosed-issues
IAMSpyA library that utilises the Z3 prover to attempt to answer questions about AWS IAM.starscontributorswatcherslast-commitopen-issuesclosed-issues
nuvolaDump and perform automatic and manual security analysis on AWS environments configurations and services using predefined, extensible and custom rules created using a simple Yaml syntaxstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-security-architecturesArchitectures for AWS security. (Detect, Alarm, Macie, etc.) Many architectures will be added in the future.starscontributorswatcherslast-commitopen-issuesclosed-issues
MetaHub for AWS Security HubMetaHub is the CLI utility for AWS Security Hub which provides you with extra functionality like grouping your findings by affected reources, executing MetaChecks and MetaTags directly in the affected resource for enriching your findings, filters on top of MetaChecks and MetaTags, different reports like CSV, JSON and HTML, bulk updates, and enriching your findings directly in AWS Security Hub.starscontributorswatcherslast-commitopen-issuesclosed-issues
MatanoMatano is an open source cloud-native security lake platform (SIEM alternative) for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS.starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-list-resourcesUses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written to a JSON output file.starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-summarize-account-activityAnalyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made and regions that were used. The summary is written to a JSON output file and can optionally be visualized as PNG files.starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-lint-iam-policiesRuns IAM policy linting checks against either a single AWS account or all accounts of an AWS Organization. Reports on policies that violate security best practices or contain errors. Supports both identity-based and resource-based policies.starscontributorswatcherslast-commitopen-issuesclosed-issues

Offensive

NameDescriptionPopularityMetadata
cloudfoxFind exploitable attack paths in cloud infrastructurestarscontributorswatcherslast-commitopen-issuesclosed-issues
WeirdAALAWS Attack Librarystarscontributorswatcherslast-commitopen-issuesclosed-issues
PacuAWS penetration testing toolkitstarscontributorswatcherslast-commitopen-issuesclosed-issues
Cred ScannerA simple file-based scanner to look for potential AWS access and secret keys in filesstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWS PWNA collection of AWS penetration testing junkstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudfruntA tool for identifying misconfigured CloudFront domainsstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudjackRoute53/CloudFront Vulnerability Assessment Utilitystarscontributorswatcherslast-commitopen-issuesclosed-issues
NimbostratusTools for fingerprinting and exploiting Amazon cloud infrastructuresstarscontributorswatcherslast-commitopen-issuesclosed-issues
GitLeaksAudit git repos for secretsstarscontributorswatcherslast-commitopen-issuesclosed-issues
TruffleHogSearches through git repositories for high entropy strings and secrets digging deep into commit historystarscontributorswatcherslast-commitopen-issuesclosed-issues
DumpsterDiver"Tool to search secrets in various filetypes like keys (e.g. AWS Access Key Azure Share Key or SSH keys) or passwords."starscontributorswatcherslast-commitopen-issuesclosed-issues
Mad-KingProof of Concept Zappa Based AWS Persistence and Attack Platformstarscontributorswatcherslast-commitopen-issuesclosed-issues
Cloud-NukeA tool for cleaning up your cloud accounts by nuking (deleting) all resources within itstarscontributorswatcherslast-commitopen-issuesclosed-issues
MozDef - The Mozilla Defense PlatformThe Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.starscontributorswatcherslast-commitopen-issuesclosed-issues
Lambda-ProxyA bridge between SQLMap and AWS Lambda which lets you use SQLMap to natively test AWS Lambda functions for SQL Injection vulnerabilities.starscontributorswatcherslast-commitopen-issuesclosed-issues
CloudCopyCloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permissionstarscontributorswatcherslast-commitopen-issuesclosed-issues
enumerate-iamEnumerate the permissions associated with AWS credential setstarscontributorswatcherslast-commitopen-issuesclosed-issues
BarqA post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructurestarscontributorswatcherslast-commitopen-issuesclosed-issues
CCATCloud Container Attack Tool (CCAT) is a tool for testing security of container environmentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
DufflebagSearch exposed EBS volumes for secretsstarscontributorswatcherslast-commitopen-issuesclosed-issues
attack_rangeA tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunkstarscontributorswatcherslast-commitopen-issuesclosed-issues
whispersIdentify hardcoded secrets and dangerous behavioursstarscontributorswatcherslast-commitopen-issuesclosed-issues
RedbotoRed Team AWS Scriptsstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudBruteA tool to find a company (target) infrastructure, files, and apps on the top cloud providersstarscontributorswatcherslast-commitopen-issuesclosed-issues

Purple Teaming & Adversary Emulation

NameDescriptionPopularityMetadata
Stratus Red TeamGranular, Actionable Adversary Emulation for the Cloudstarscontributorswatcherslast-commitopen-issuesclosed-issues
LeonidasAutomated Attack Simulation in the Cloud complete with detection use cases.starscontributorswatcherslast-commitopen-issuesclosed-issues
Amazon Guardduty TesterThis script is used to generate some basic detections of the GuardDuty servicestarscontributorswatcherslast-commitopen-issuesclosed-issues

Continuous Security Auditing

NameDescriptionPopularityMetadata
Security Monkeystarscontributorswatcherslast-commitopen-issuesclosed-issues
Krampusstarscontributorswatcherslast-commitopen-issuesclosed-issues
Cloud Inquisitorstarscontributorswatcherslast-commitopen-issuesclosed-issues
Disable keys after X daysstarscontributorswatcherslast-commitopen-issuesclosed-issues
Repokid Least Privilegestarscontributorswatcherslast-commitopen-issuesclosed-issues
Wazuh CloudTrail modulestarscontributorswatcherslast-commitopen-issuesclosed-issues
Hammerstarscontributorswatcherslast-commitopen-issuesclosed-issues
Streamalertstarscontributorswatcherslast-commitopen-issuesclosed-issues
Billing Alerts CFN templatesstarscontributorswatcherslast-commitopen-issuesclosed-issues
WatchmenAWS account compliance using centrally managed Config Rulesstarscontributorswatcherslast-commitopen-issuesclosed-issues
ElectricEyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availabilitystarscontributorswatcherslast-commitopen-issuesclosed-issues
SyntheticSuna defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threatsstarscontributorswatcherslast-commitopen-issuesclosed-issues
CloudQuerycloudquery exposes your cloud configuration and metadata as sql tables, providing powerful analysis and monitoring for compliance and securitystarscontributorswatcherslast-commitopen-issuesclosed-issues
PrismXCloud Security Dashboard for AWS - based on ScoutSuitestarscontributorswatcherslast-commitopen-issuesclosed-issues
FalcoThreat detection and response for containers, hosts, Kubernetes and the cloudstarscontributorswatcherslast-commitopen-issuesclosed-issues

Digital Forensics and Incident Response

NameDescriptionPopularityMetadata
AWS IRAWS specific Incident Response and Forensics Toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
MargaritashotgunLinux memory remote acquisition toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
DiffyTriage tool used during cloud-centric security incidentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWS Security AutomationAWS scripts and resources for DevSecOps and automated incident responsestarscontributorswatcherslast-commitopen-issuesclosed-issues
GDPatrolAutomated Incident Response based off AWS GuardDuty findingsstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWSlogShow the history and changes between configuration versions of AWS resources using AWS Configstarscontributorswatcherslast-commitopen-issuesclosed-issues
DataCopAutomated IR process that mitigates vulnerable AWS S3 buckets that are defined by AWS Macie results.starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS_ResponderAWS Digital Forensic and Incident Response (DFIR) Response Python Scriptsstarscontributorswatcherslast-commitopen-issuesclosed-issues
SSM-AcquireA python module for orchestrating content acquisitions and analysis via Amazon SSMstarscontributorswatcherslast-commitopen-issuesclosed-issues
cloudtrail-partitionerThis project sets up partitioned Athena tables for your CloudTrail logs and updates the partitions nightly. Makes CloudTrail logs queries easier.starscontributorswatcherslast-commitopen-issuesclosed-issues
fargate-irProof of concept incident response demo using SSM and AWS Fargate.starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-logsearchSearch AWS CloudWatch logs all at once on the command line.starscontributorswatcherslast-commitopen-issuesclosed-issues
VarnaQuick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-auto-remediateOpen source application to instantly remediate common security issues through the use of AWS Configstarscontributorswatcherslast-commitopen-issuesclosed-issues
panther-labsDetect threats with log data and improve cloud security posturestarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-incident-responseThis page is a collection of useful things to look for in CloudTrail using Athena for AWS incident responsestarscontributorswatcherslast-commitopen-issuesclosed-issues
cloud-forensics-utilsPython library to carry out DFIR analysis on the Cloudstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-fast-fixesScripts to quickly fix security and compliance issuesstarscontributorswatcherslast-commitopen-issuesclosed-issues

Development Security

NameDescriptionPopularityMetadata
Automated Security Helper (ASH)ASH is a one stop shop for code security scans, and does not require any installation. It will identify the relevant frameworks, and download the relevant, up to date tools. ASH is running on isolated Docker containers, keeping the user environment clean, with a single aggregated report. The following frameworks are supported: Git, Python, Javascript, Cloudformation, Terraform and Jupyter notebook.starscontributorswatcherslast-commitopen-issuesclosed-issues
CFN NAGCloudFormation security test (Ruby)starscontributorswatcherslast-commitopen-issuesclosed-issues
Git-secretsstarscontributorswatcherslast-commitopen-issuesclosed-issues
Repository of sample Custom Rules for AWS Configstarscontributorswatcherslast-commitopen-issuesclosed-issues
CFripper"Lambda function to ""rip apart"" a CloudFormation template and check it for security compliance."starscontributorswatcherslast-commitopen-issuesclosed-issues
AssumeA simple CLI utility that makes it easier to switch between different AWS rolesstarscontributorswatcherslast-commitopen-issuesclosed-issues
TerrascanA collection of security and best practice tests for static code analysis of terraform templates using terraform_validatestarscontributorswatcherslast-commitopen-issuesclosed-issues
tfsecProvides static analysis of your terraform templates to spot potential security issuesstarscontributorswatcherslast-commitopen-issuesclosed-issues
CheckovTerraform, Cloudformation and Kubernetes static analysis written in pythonstarscontributorswatcherslast-commitopen-issuesclosed-issues
YorAutomatically tag and trace infrastructure as code frameworks (Terraform, Cloudformation and Serverless)starscontributorswatcherslast-commitopen-issuesclosed-issues
pytest-servicesUnit testing framework for test driven security of AWS configurations and morestarscontributorswatcherslast-commitopen-issuesclosed-issues
IAM Least-Privileged Role GeneratorA Serverless framework plugin that statically analyzes AWS Lambda function code and automagically generates least-privileged IAM roles.starscontributorswatcherslast-commitopen-issuesclosed-issues
AWS VaultA vault for securely storing and accessing AWS credentials in development environmentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWS Service Control PoliciesCollection of semi-useful Service Control Policies and scripts to manage themstarscontributorswatcherslast-commitopen-issuesclosed-issues
Terraform-complianceA lightweight security focused BDD test framework against terraform (with helpful code for AWS)starscontributorswatcherslast-commitopen-issuesclosed-issues
Get a List of AWS Managed Policiesa way to get a list of all AWS managed policiesstarscontributorswatcherslast-commitopen-issuesclosed-issues
ParliamentAWS IAM linting librarystarscontributorswatcherslast-commitopen-issuesclosed-issues
AWS-ComplianceMachineDontStopProof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security Identity & Compliance Services to Support your AWS Account Security Posturestarscontributorswatcherslast-commitopen-issuesclosed-issues
detect-secretsAn enterprise friendly way of detecting and preventing secrets in code.starscontributorswatcherslast-commitopen-issuesclosed-issues
tf-parliamentRun Parliament AWS IAM Checker on Terraform Filesstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-gateBetter AWS SSM Session manager CLI clientstarscontributorswatcherslast-commitopen-issuesclosed-issues
iam-lintGithub action for linting AWS IAM policy documents for correctness and possible security issuesstarscontributorswatcherslast-commitopen-issuesclosed-issues
RegulaRegula checks Terraform for AWS security and compliance using Open Policy Agent/Regostarscontributorswatcherslast-commitopen-issuesclosed-issues
whispersIdentify hardcoded secrets and dangerous behavioursstarscontributorswatcherslast-commitopen-issuesclosed-issues
cloudformation-guardA set of tools to check AWS CloudFormation templates for policy compliance using a simple, policy-as-code, declarative syntax.starscontributorswatcherslast-commitopen-issuesclosed-issues
IAMFinderEnumerates and finds users and IAM roles in a target AWS accountstarscontributorswatcherslast-commitopen-issuesclosed-issues
iamliveGenerate a basic IAM policy from AWS client-side monitoring (CSM)starscontributorswatcherslast-commitopen-issuesclosed-issues
aws-allowlisterAutomatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.starscontributorswatcherslast-commitopen-issuesclosed-issues
LeappCross-platform app for managing AWS credentials programmatically, based on Electronstarscontributorswatcherslast-commitopen-issuesclosed-issues
KICSFind security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-codestarscontributorswatcherslast-commitopen-issuesclosed-issues
SecurityHub CIS Compliance AutomatorAutomatically configure your AWS Account to meet 95% of the 200+ controls for CIS Compliance, PCI DSS Compliance and AWS Security Best Practicestarscontributorswatcherslast-commitopen-issuesclosed-issues
SCPkitA SCP management tool that helps condense policiesstarscontributorswatcherslast-commitopen-issuesclosed-issues
CodemodderA pluggable framework for building expressive codemods. Use Codemodder when you need more than a linter or code formatting tool. Use it to fix non-trivial security issues and other code quality problemsstarscontributorswatcherslast-commitopen-issuesclosed-issues

S3 Buckets Auditing

NameDescriptionPopularityMetadata
mass3enumerate through a pre-compiled list of AWS S3 buckets using DNS instead of HTTP with a list of DNS resolvers and multi-threadingstarscontributorswatcherslast-commitopen-issuesclosed-issues
teh_s3_bucketeersstarscontributorswatcherslast-commitopen-issuesclosed-issues
bucket-streamFind interesting Amazon S3 Buckets by watching certificate transparency logsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3-buckets-finderbrute force Amazon S3 bucketstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3findfind S3 public bucketsstarscontributorswatcherslast-commitopen-issuesclosed-issues
slurp-robbieEnumerate S3 buckets via certstream, domain, or keywordsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3-inspectorcheck AWS S3 bucket permissionsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3-fuzzerstarscontributorswatcherslast-commitopen-issuesclosed-issues
AWSBucketDumpLook For Interesting Files in S3 Bucketsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3scanscan s3 buckets for security issuesstarscontributorswatcherslast-commitopen-issuesclosed-issues
S3ScannerScan for open AWS S3 buckets and dump the contentsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3finderopen S3 bucket finderstarscontributorswatcherslast-commitopen-issuesclosed-issues
S3Scanspider a website and find publicly open S3 bucketsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3-metaGather metadata about your S3 bucketsstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3-utilsUtilities and tools based around Amazon S3 to provide convenience APIs in a CLIstarscontributorswatcherslast-commitopen-issuesclosed-issues
S3PublicBucketsCheckA lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is createdstarscontributorswatcherslast-commitopen-issuesclosed-issues
bucket_finderAmazon bucket brute force toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
inSp3ctorAWS S3 Bucket/Object Finderstarscontributorswatcherslast-commitopen-issuesclosed-issues
bucketcatBrute-forces objects within a given bucket using Hashcat mask-like syntaxstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-s3-data-finderAWS S3 Sensitive Data Searchstarscontributorswatcherslast-commitopen-issuesclosed-issues
lazys3bruteforce AWS s3 buckets using different permutationsstarscontributorswatcherslast-commitopen-issuesclosed-issues
BucketScannerTest objects' permissions in AWS bucketsstarscontributorswatcherslast-commitopen-issuesclosed-issues
aws-externder-cliTest S3 buckets as well as Google Storage buckets and Azure Storage containers to find interesting filesstarscontributorswatcherslast-commitopen-issuesclosed-issues
festinS3 bucket weakness discoverystarscontributorswatcherslast-commitopen-issuesclosed-issues
S3Insightsa platform for efficiently deriving security insights about S3 data through metadata analysisstarscontributorswatcherslast-commitopen-issuesclosed-issues
s3_objects_checkWhitebox evaluation of effective S3 object permissions, to identify publicly accessible files.starscontributorswatcherslast-commitopen-issuesclosed-issues

Training

NameDescriptionPopularityMetadata
Flaws.cloudflAWS challenge to learn through a series of levels about common mistakes and gotchas when using AWS
Flaws2.cloudflAWS 2 has two paths this time Attacker and Defender! In the Attacker path you'll exploit your way through misconfigurations in serverless (Lambda) and containers (ECS Fargate). In the Defender path that target is now viewed as the victim and you'll work as an incident responder for that same app understanding how an attack happened
CloudGoatVulnerable by Design AWS infrastructure setup toolstarscontributorswatcherslast-commitopen-issuesclosed-issues
dvcaDamn Vulnerable Cloud Application more infostarscontributorswatcherslast-commitopen-issuesclosed-issues
AWSDetonationLabScripts and templates to generate some basic detections of the AWS security servicesstarscontributorswatcherslast-commitopen-issuesclosed-issues
OWASPServerlessGoatOWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application maintained by OWASP for educational purposes. Single click installation through the AWS Serverless Application Repository.starscontributorswatcherslast-commitopen-issuesclosed-issues
SadcloudA tool for spinning up insecure AWS infrastructure with Terraform. It supports approx. 84 misconfigurations across 22 AWS Services.starscontributorswatcherslast-commitopen-issuesclosed-issues
BigOrange ActionsPaste your IAM Policy and get a list of Actions it can effectively perform
IncidentResponseGeneratorIncident response generator for training classesstarscontributorswatcherslast-commitopen-issuesclosed-issues
Breaking and Pwning Apps and Servers on AWS and AzureCourse content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!starscontributorswatcherslast-commitopen-issuesclosed-issues
terragoat"Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.starscontributorswatcherslast-commitopen-issuesclosed-issues
cfngoat"Vulnerable by Design" cloudformation repository. CfnGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.starscontributorswatcherslast-commitopen-issuesclosed-issues
CDKgoat"Vulnerable by Design" AWS CDK repository. CDKGoat is a learning and training project that demonstrates how common configuration errors can find their way into impartive IAC such as AWS CDK.starscontributorswatcherslast-commitopen-issuesclosed-issues
aws_exposable_resourcesResource types that can be publicly exposed on AWSstarscontributorswatcherslast-commitopen-issuesclosed-issues
IAM VulnerableUse Terraform to create your own vulnerable by design AWS IAM privilege escalation playgroundstarscontributorswatcherslast-commitopen-issuesclosed-issues
PenTesting.CloudFree AWS Security Labs - CTF Style
AWSGoat : A Damn Vulnerable AWS InfrastructureAWSGoat is a vulnerable by design AWS infrastructure featuring OWASP Top 10 web application security risks (2021) and AWS service based misconfigurations.starscontributorswatcherslast-commitopen-issuesclosed-issues

Other interesting tools/code

Honey-token:

More Resources:

close