Cloud and Container Security
aws-security

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A Python script to test the security of AWS S3 buckets

s3tk Logo

s3tk

0 (0)

A security toolkit for Amazon S3

Converts the format of various S3 buckets for bug bounty and security testing.

A tool to identify publicly accessible S3 objects

s3cario Logo

s3cario

0 (0)

A tool for testing AWS S3 bucket permissions and security

S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.

Krampus Logo

Krampus

0 (0)

Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.

A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.

kicks3 Logo

kicks3

0 (0)

A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing

A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.

An open-sourced framework for managing resources across hundreds of AWS Accounts

Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.

Generate Amazon GuardDuty findings related to real AWS resources with multiple tests available.

A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.

A tool to analyze and audit AWS environments for security issues and misconfigurations.

An open-source framework for testing and validating the security of AWS services and resources.

Open-source tool for analyzing AWS temporary tokens to detect malicious activity.

auspex Logo

auspex

0 (0)

A graph-based tool for visualizing effective access and resource relationships within AWS

Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.