auspex is a graph-based tool for visualizing effective access and resource relationships within AWS. It resolves policy information to determine what actions affect which resources, while taking into account how these actions may be combined to produce attack paths. Getting Started Installation Usage Contributing License For more information, checkout the awspx Wiki Getting Started For detailed installation instructions, usage, and answers to frequently asked questions, see sections: Setup; Data Collection and Exploration; and FAQs, respectively. Installation awspx can be installed on either Linux or macOS. In each case Docker is required. Clone this repo git clone https://github.com/FSecureLABS/awspx.git Run the INSTALL script cd awspx && ./INSTALL Usage awspx consists of two main components: the ingestor, which collects AWS account data; and the web interface, which allows
FEATURES
SIMILAR TOOLS
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
A framework to analyze container images and gather useful information.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
A collection of security workshops and hands-on content for AWS security services and techniques
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.