Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual inspection and highlights high-risk areas automatically. Rather than pouring through dozens of pages on the web, Scout2 supplies a clear view of the attack surface automatically. Note: Scout2 is stable and actively maintained, but a number of features and internals may change. As such, please bear with us as we find time to work on, and improve, the tool. Feel free to report a bug with details (e.g. console output using the "--debug" argument), request a new feature, or send a pull request.
FEATURES
SIMILAR TOOLS
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
A tool to analyze and audit AWS environments for security issues and misconfigurations.
A comprehensive cloud security platform that provides threat prevention, posture management, and risk prioritization across cloud applications, networks, and workloads.
Open-source tool for analyzing AWS temporary tokens to detect malicious activity.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.