Cloudlist is a multi-cloud tool for getting Assets from Cloud Providers. It is intended for blue teams to centralize assets across multiple clouds with minimal configuration. Features include listing cloud assets with multiple configurations, support for multiple cloud providers, output formats, filters, and extensibility. It also supports stdout for pipeline integration. Usage: cloudlist -h for help and various flags for configuration and filtering.
FEATURES
ALTERNATIVES
Tool for analyzing cloud resources against best practices and generating reports.
An AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.
Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.
Converts the format of various S3 buckets for bug bounty and security testing.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
Comprehensive suite of tools and resources by Microsoft Azure for ensuring security and protection of data and applications in the cloud.
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
Nuvola is a tool for security analysis on AWS environments with a focus on creating a digital twin of cloud platforms.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.