
A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.

A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.
Perimeterator is a distributed security auditing tool designed for continuous monitoring of internet-facing AWS services. The tool automatically enumerates public IP addresses associated with various AWS resources including EC2 instances, Elastic Load Balancers (ELB and ELBv2), RDS databases, and Elasticsearch clusters. The system operates through a distributed architecture using AWS SQS queues for asynchronous communication between components. It consists of scanner workers that can be deployed across different networks to simulate external access patterns and provide visibility into services as they appear from the general internet. The enumeration process identifies potentially misconfigured AWS resources that are exposed to the internet, then queues these targets for network service scanning. Scanner workers process items from the work queue to detect open network services on the identified IP addresses. Deployment is facilitated through provided Terraform configurations, allowing for quick setup within AWS environments. The tool supports continuous auditing workflows by periodically reassessing the attack surface of AWS infrastructure.
Common questions about Perimeterator including features, pricing, alternatives, and user reviews.
Perimeterator is A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources. It is a Attack Surface solution designed to help security teams with AWS, Scanner.
Perimeterator is a free Attack Surface tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/darkarnium/perimeterator/ for download and installation instructions.
Popular alternatives to Perimeterator include:
Compare these tools and more at https://cybersectools.com/categories/attack-surface
Perimeterator is for security teams and organizations that need AWS, Scanner. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Attack Surface tools can be found at https://cybersectools.com/categories/attack-surface
Attack surface mgmt platform with vuln scanning and cloud security features
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.