Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
A Python script to test the security of AWS S3 buckets
A tool to enumerate S3 buckets for a specific target
Converts the format of various S3 buckets for bug bounty and security testing.
A tool to identify publicly accessible S3 objects
Lists Amazon S3 Buckets while browsing
A tool for testing AWS S3 bucket permissions and security
S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.
Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.
A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.
A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
An open-sourced framework for managing resources across hundreds of AWS Accounts
Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.
Generate Amazon GuardDuty findings related to real AWS resources with multiple tests available.
A tool that discovers all AWS resources created in an account
A Terraform module to set up a secure AWS account configuration baseline
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
A tool to analyze and audit AWS environments for security issues and misconfigurations.
An open-source framework for testing and validating the security of AWS services and resources.
Open-source tool for analyzing AWS temporary tokens to detect malicious activity.
A graph-based tool for visualizing effective access and resource relationships within AWS
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.