Show the history and changes between configuration versions of AWS resources Uses AWS Config to fetch the configuration history of resources, only works on resources supported by AWS Config. Installation: pip install awslog Usage: Make sure your AWS credentials are properly configured. You can test it using the AWS CLI by issuing aws sts get-caller-identity. It should report information about your current CLI session and not raise any errors. Make sure AWS Config is set up to record configuration changes of your resources. CLI usage: awslog [-h] [--type TYPE] [--number NUMBER] [--before BEFORE] [--after AFTER] [--deleted] [--context CONTEXT] [--no-color] name positional arguments: name name or ID of the resource to query optional arguments: -h, --help show this help message and exit --type TYPE, -t TYPE the type of the resource to query list of supported resource types: https://docs.aws.amazon.com/config/latest/developerguide/resource-config-reference.html --number NUMBER, -n NUMBER number of history items to show --before BEFORE, -b BEFORE show changes more recent than the specified date and time --after AFTER, -a AFTER show changes older than the specified date and time --deleted show deleted resources --context CONTEXT show context of the changes --no-color disable color output
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source project for detecting security risks in cloud infrastructure accounts with support for AWS, Azure, GCP, OCI, and GitHub.
A framework to analyze container images and gather useful information.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
A collection of security workshops and hands-on content for AWS security services and techniques
In-depth analysis and insights on various cloud security topics by Rhino Security Labs team
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.