Need a quick way to visualize your current AWS/Amazon EC2 security group configuration? aws-security-viz does just that based on the EC2 security group ingress configuration. FEATURES: Output to any of the formats that Graphviz supports. EC2 classic and VPC security groups INSTALLATION: $ gem install aws_security_viz $ aws_security_viz --help DEPENDENCIES: graphviz brew install graphviz USAGE: To generate the graph directly using AWS keys $ aws_security_viz -a your_aws_key -s your_aws_secret_key -f viz.svg --color=true To generate the graph using an existing security_groups.json (created using aws-cli) $ aws_security_viz -o data/security_groups.json -f viz.svg --color To generate a web view $ aws_security_viz -a your_aws_key -s your_aws_secret_key -f aws.json --renderer navigator Generates two files: aws.json and navigator.html. The json file name needs to be passed in as a html fragment identifier. The generated graph can be viewed in a webserver e.g. http://localhost:3000/navigator.html#aws.json by using ruby -run -e httpd -- -p 3000 DOCKER USAGE: If you don't want to install
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A library for validating and accessing environment variables in Node.js programs
SecGen creates vulnerable virtual machines and hacking challenges for learning security penetration testing techniques.
A tool for scraping CTF writeups from ctftime.org and organizing them for easy access.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
An open-source artifact metadata API for managing metadata about software resources and governing the software supply chain.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.