aws-gate is a tool designed to facilitate secure connections to AWS EC2 instances through AWS Systems Manager (SSM) Session Manager. The tool addresses connectivity challenges by leveraging SSM's session management capabilities to establish secure tunnels to EC2 instances without requiring direct network access or SSH keys. The tool requires Python 3.5 or later and depends on the session-plugin-manager component from AWS SSM Agent version 2.3.68.0 or later to be installed on target EC2 instances. It also requires proper IAM permissions to be configured for the instance profile to enable session management functionality. aws-gate provides a streamlined approach to accessing EC2 instances by utilizing AWS's native session management infrastructure, eliminating the need for traditional SSH key management or VPN connections. The tool integrates with existing AWS authentication mechanisms and leverages the security controls provided by AWS Systems Manager.
FEATURES
SIMILAR TOOLS
KICS is an open-source Infrastructure as Code security scanner that detects vulnerabilities and misconfigurations through customizable queries and integrates with CI/CD pipelines.
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.
CloudSploit by Aqua is an open-source multi-cloud security scanning tool that detects security risks and compliance issues across AWS, Azure, GCP, OCI, and GitHub platforms.
A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.
SkyWrapper analyzes temporary token behaviors in AWS accounts to detect suspicious activities and generates Excel reports with findings summaries.
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
AWS Vault securely stores AWS IAM credentials in the operating system's keystore and generates temporary credentials for development environments.