Loading...
A multi-threaded Ruby tool for comprehensive AWS security inventory collection that gathers detailed resource attributes, metadata, and policy information across AWS environments.

A multi-threaded Ruby tool for comprehensive AWS security inventory collection that gathers detailed resource attributes, metadata, and policy information across AWS environments.
AWS Recon is a multi-threaded inventory collection tool written in Ruby that focuses on gathering comprehensive AWS resource attributes and metadata for security assessment purposes. The tool collects detailed information about AWS resources with emphasis on security configuration and posture evaluation. It provides more granular coverage than existing solutions like AWS Config by capturing detailed resource attribute data, fully parsed policy documents, and nested resource relationships. Key capabilities include automatic handling of API throttling through retries, automatic paging for large responses exceeding 100 resources per API call, and multi-threaded parallel processing to improve collection efficiency from large AWS accounts. The tool offers flexible output options including console display, JSON lines format, plain JSON, file output, S3 bucket storage, and standard output. It provides comprehensive resource coverage with particular strength in ECS and EKS environments, along with granular resource detail that includes nested related resources in the output. AWS Recon is designed to handle enterprise-scale AWS environments efficiently through rate limiting, automatic retries, and automatic result pagination while maintaining comprehensive security-focused data collection.
Common questions about AWS Recon including features, pricing, alternatives, and user reviews.
AWS Recon is A multi-threaded Ruby tool for comprehensive AWS security inventory collection that gathers detailed resource attributes, metadata, and policy information across AWS environments.. It is a Cloud Security solution designed to help security teams with Asset Inventory, Configuration Management, CLI.
Get strategic cybersecurity insights in your inbox