Solutions for securing cloud infrastructure, services, and containerized environments. Task: Security Audit
Explore 11 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A tool to identify publicly accessible S3 objects
An open-source security tool for AWS, Azure, Google Cloud, and Kubernetes security assessments and audits.
Conmachi is a Golang tool for scanning container environments for security issues.
AWS Scout2 is a security tool for AWS administrators to assess their environment's security posture.
Multi-account cloud security tool for AWS with real-time reporting and auto-remediation capabilities.
Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
Docker security audit tool with custom audit profiles and JSON report generation based on CIS Docker 1.6 Benchmark.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
A tool to analyze and audit AWS environments for security issues and misconfigurations.
Open-source tool for analyzing AWS temporary tokens to detect malicious activity.
A script and library for identifying risks in AWS IAM configuration