auspex Logo

auspex

0
Free
973
25 Aug 2021
10 September 2025
Visit Website

auspex is a graph-based visualization tool designed for analyzing AWS environments to understand effective access permissions and resource relationships. The tool resolves AWS policy information to determine which actions can affect specific resources within an AWS account. It takes into account how different actions may be combined to create potential attack paths, providing security teams with visibility into privilege escalation opportunities and lateral movement possibilities. auspex consists of two main components: an ingestor that collects AWS account data, and a web interface that enables interactive exploration of the collected information. The tool presents this data in a graph format, making it easier to visualize complex relationships between AWS resources, permissions, and potential security risks. The tool requires Docker for installation and can be deployed on Linux or macOS systems. It helps security professionals understand the effective permissions landscape within their AWS infrastructure by mapping out how IAM policies, resource-based policies, and service configurations interact to create access patterns.

FEATURES

SIMILAR TOOLS

A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.

A deprecated Kubernetes workload policy enforcement tool that helped secure multi-tenant clusters through various security policies and configurations.

Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.

AWS Vault securely stores AWS IAM credentials in the operating system's keystore and generates temporary credentials for development environments.

Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.

S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.

KICS is an open-source Infrastructure as Code security scanner that detects vulnerabilities and misconfigurations through customizable queries and integrates with CI/CD pipelines.

TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.

Collection of Kubernetes manifests creating pods with elevated privileges for security testing.

PINNED

RoboShadow Logo

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Vulnerability Management
Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved