Nuvola (with the lowercase n) is a tool to dump and perform automatic and manual security analysis on AWS environments configurations and services using predefined, extensible and custom rules created using a simple Yaml syntax. The general idea behind this project is to create an abstracted digital twin of a cloud platform. For a more concrete example: nuvola reflects the BloodHound traits used for Active Directory analysis but on cloud environments (at the moment only AWS). The usage of a graph database also increases the possibility of finding different and innovative attack paths and can be used as an offline, centralised and lightweight digital twin. Quick Start Requirements: - docker-compose installed - an AWS account configured to be used with awscli with full access to the cloud resources, better if in ReadOnly mode (the policy arn:aws:iam::aws:policy/ReadOnlyAccess is fine) Setup: - Clone the repository: git clone --depth=1 https://github.com/primait/nuvola.git; cd nuvola - Create and edit, if required, the .env file to set your DB username/password/URL: cp .env_example .env; You may need to edit the size of the memory allocated to Neo4j if you run the tool on a low-RAM device.
FEATURES
SIMILAR TOOLS
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
In-depth analysis and insights on various cloud security topics by Rhino Security Labs team
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.