HAWK is a multi-cloud antivirus scanning API that integrates CLAMAV and YARA engines for malware detection across AWS S3, Azure Blob Storage, and GCP Cloud Storage platforms. The tool operates as a microservice architecture that provides stream-based scanning capabilities using both YARA rules and CLAMAV signatures. It can automatically scan objects stored in S3 buckets and perform automated actions based on scan results. Key scanning capabilities include real-time stream scanning, S3 bucket object scanning, and support for custom YARA rule management. The system can automatically move clean objects to designated buckets while quarantining infected files to prevent further distribution. HAWK maintains up-to-date threat detection through automatic CLAMAV database updates and supports custom YARA rule functionality for specialized detection requirements. The system uses logrus for enhanced logging capabilities and provides comprehensive API endpoints for scanning operations, rule management, system metrics, and health monitoring. The tool is distributed through automated builds available on container registries and supports deployment across multiple cloud storage platforms through its unified API interface.
FEATURES
SIMILAR TOOLS
Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.
A command-line security auditing tool that performs Lynis-based security assessments across AWS, GCP, Azure, and DigitalOcean cloud platforms.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.
AWS Vault securely stores AWS IAM credentials in the operating system's keystore and generates temporary credentials for development environments.
LambdaGuard is an AWS Lambda auditing tool that provides security configuration checks, statistical analysis, and service dependency mapping for serverless functions.
SkyWrapper analyzes temporary token behaviors in AWS accounts to detect suspicious activities and generates Excel reports with findings summaries.
A framework for analyzing container images, running scripts inside containers, and gathering information for static analysis and policy enforcement.
A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.