Cloud Security Suite (cs-suite) Logo

Cloud Security Suite (cs-suite)

0
Free
Visit Website

Version 3.0 Usage usage: cs.py [-h] -env {aws,gcp,azure,digitalocean} -aip AUDIT_IP -u USER_NAME -pem PEM_FILE [-p] [-pId PROJECT_ID] [-az_u AZURE_USER] [-az_p AZURE_PASS] [-o OUTPUT] [-w] [-n NUMBER] this is to get IP address for lynis audit only optional arguments: -h, --help show this help message and exit -env {aws,gcp,azure,digitalocean}, --environment {aws,gcp,azure,digitalocean} The cloud on which the test-suite is to be run -aip AUDIT_IP, --audit_ip AUDIT_IP The IP for which lynis Audit needs to be done .... by default tries root/Administrator if username not provided -u USER_NAME, --user_name USER_NAME The username of the user to be logged in,for a specific user -pem PEM_FILE, --pem_file PEM_FILE The pem file to access to AWS instance -p, --password hidden password prompt -pId PROJECT_ID, --project_id PROJECT_ID Project ID for which GCP Audit needs to be run. Can be retrivied using `gcloud projects list` -az_u AZURE_USER, --azure_user AZURE_USER username of azure account, optionally used if you want to run the azure audit with no user interaction. -az_p AZURE_PASS, --azure_pass AZURE_PASS username of azure password, optionally used if you

FEATURES

ALTERNATIVES

Export Kubernetes events for observability and alerting purposes with flexible routing options.

A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.

A tool to enumerate S3 buckets for a specific target

Gatekeeper is a policy management tool for Kubernetes that provides an extensible, parameterized policy library and native Kubernetes CRDs for instantiating and extending the policy library.

A graph-based tool for visualizing effective access and resource relationships within AWS

A collection of tools for forensics teams to collect evidence from cloud platforms

A command line tool that counts Amazon resources across regions and displays the results in a friendly format.

A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved