Perimeterator Logo

Perimeterator

A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.

64
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Perimeterator Description

Perimeterator is a distributed security auditing tool designed for continuous monitoring of internet-facing AWS services. The tool automatically enumerates public IP addresses associated with various AWS resources including EC2 instances, Elastic Load Balancers (ELB and ELBv2), RDS databases, and Elasticsearch clusters. The system operates through a distributed architecture using AWS SQS queues for asynchronous communication between components. It consists of scanner workers that can be deployed across different networks to simulate external access patterns and provide visibility into services as they appear from the general internet. The enumeration process identifies potentially misconfigured AWS resources that are exposed to the internet, then queues these targets for network service scanning. Scanner workers process items from the work queue to detect open network services on the identified IP addresses. Deployment is facilitated through provided Terraform configurations, allowing for quick setup within AWS environments. The tool supports continuous auditing workflows by periodically reassessing the attack surface of AWS infrastructure.

Perimeterator FAQ

Common questions about Perimeterator including features, pricing, alternatives, and user reviews.

Perimeterator is A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.. It is a Attack Surface solution designed to help security teams with AWS, Scanner.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Intruder Attack Surface Management Logo

Attack surface mgmt platform with vuln scanning and cloud security features

0
TruffleHog Forager Logo

Scans public internet for leaked cloud service keys and verifies them

0
FestIn Logo

FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.

0
Binary Edge Logo

A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.

0
GrayHatWarfare Buckets Logo

A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox