Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Aws

Explore 181 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ManageEngine CloudSpend Logo

Cloud cost management platform that provides optimization recommendations

0
Trend Micro File Security Logo

Malware scanning for cloud object storage and file services

0
Maze AI Agents Logo

AI agents investigate cloud vulnerabilities and automate remediation workflows

0
Plexicus CSPM Logo

CSPM platform for AWS, Azure, GCP, and OCI misconfiguration detection

0
Matos CNAPP Security Platform Logo

Unified cloud-native security platform for multi-cloud protection

0
AWS IAM Access Analyzer Logo

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
Snyk Code Logo

Snyk Code is a real-time SAST tool that provides secure code analysis and actionable remediation advice to prevent code delays and ensure secure development.

0
s3viewer Logo

A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.

0
mass-s3-bucket-tester Logo

A Python tool that tests multiple AWS S3 buckets for security misconfigurations including directory listing and upload permissions.

0
s3tk Logo

A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.

0
2tearsinabucket Logo

A tool for enumerating and analyzing Amazon S3 buckets associated with specific targets to identify potential security misconfigurations.

0
s3reverse Logo

A format conversion tool for S3 buckets designed to assist bug bounty hunters and security testers in standardizing bucket data during reconnaissance activities.

0
s3_objects_check Logo

A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.

0
S3BucketList Logo

A Chrome extension that automatically detects and lists Amazon S3 buckets while browsing websites.

0
AWSBucketDump Logo

A security tool for discovering and analyzing interesting files in AWS S3 buckets across multiple regions and bucket types.

0
s3cario Logo

S3cario is an AWS S3 bucket security testing tool that validates permissions and identifies potential vulnerabilities through scenario simulation.

0
TrailScraper Logo

TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.

0
S3Scanner Logo

S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.

0
Varna Logo

Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.

0
Krampus Logo

Krampus is an AWS resource management tool that automates the deletion and disabling of cloud objects based on JSON task files for security remediation and cost control.

0
ssm-acquire Logo

A Python module for orchestrating remote forensic data acquisition and analysis from Linux instances using Amazon SSM.

0
AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge Logo

An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.

0
Access Undenied on AWS Logo

Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.

0