Show the history and changes between configuration versions of AWS resources Uses AWS Config to fetch the configuration history of resources, only works on resources supported by AWS Config. Installation: pip install awslog Usage: Make sure your AWS credentials are properly configured. You can test it using the AWS CLI by issuing aws sts get-caller-identity. It should report information about your current CLI session and not raise any errors. Make sure AWS Config is set up to record configuration changes of your resources. CLI usage: awslog [-h] [--type TYPE] [--number NUMBER] [--before BEFORE] [--after AFTER] [--deleted] [--context CONTEXT] [--no-color] name positional arguments: name name or ID of the resource to query optional arguments: -h, --help show this help message and exit --type TYPE, -t TYPE the type of the resource to query list of supported resource types: https://docs.aws.amazon.com/config/latest/developerguide/resource-config-reference.html --number NUMBER, -n NUMBER number of history items to show --before BEFORE, -b BEFORE show changes more recent than the specified date and time --after AFTER, -a AFTER show changes older than the specified date and time --deleted show deleted resources --context CONTEXT show context of the changes --no-color disable color output
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CloudScraper is a tool for enumerating cloud resources, including S3 Buckets, Azure Blobs, and Digital Ocean Storage Space.
Cloud Security Dashboard with AWS CIS Security Benchmarks and JIRA integration.
A collection of tools to debug and inspect Kubernetes resources and applications, managing eBPF programs execution and mapping kernel primitives to Kubernetes resources.
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
gVisor is an application kernel that provides isolation for running sandboxed containers.
A collection of tools for forensics teams to collect evidence from cloud platforms
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.