AWS Recon Logo

AWS Recon

0
Free
Visit Website

A multi-threaded AWS security-focused inventory collection tool written in Ruby. This tool was created to facilitate efficient collection of a large amount of AWS resource attributes and metadata. It aims to collect nearly everything that is relevant to the security configuration and posture of an AWS environment. Existing tools (e.g. AWS Config) that do some form of resource collection lack the coverage and specificity to accurately measure security posture (e.g. detailed resource attribute data, fully parsed policy documents, and nested resource relationships). AWS Recon handles collection from large accounts by taking advantage of automatic retries (either due to network reliability or API throttling), automatic paging of large responses (> 100 resources per API call), and multi-threading parallel requests to speed up collection. Project Goals: More complete resource coverage than available tools (especially for ECS & EKS), more granular resource detail, including nested related resources in the output, flexible output (console, JSON lines, plain JSON, file, S3 bucket, and standard out), and efficient (multi-threaded, rate limited, automatic retries, and automatic result pagination).

FEATURES

ALTERNATIVES

Tool for analyzing cloud resources against best practices and generating reports.

Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.

A Python script to test the security of AWS S3 buckets

Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.

Golang client for querying SecurityTrails API data

Cloud Security Dashboard with AWS CIS Security Benchmarks and JIRA integration.

Automatically compile AWS SCPs for compliant AWS services based on preferred frameworks.

A publicly open storage viewer for various storage services.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved