s3viewer is a storage exploration tool designed to view and browse publicly accessible cloud storage resources across multiple platforms. The tool provides unified access to various storage services including Amazon S3 buckets, Azure Blob storage containers, FTP servers, and HTTP directory listings. It enables users to navigate through publicly exposed storage repositories without requiring authentication credentials. The application offers a centralized interface for examining the contents of open storage systems, allowing security professionals and researchers to identify misconfigured or unintentionally exposed data repositories. Users can browse directory structures, view file listings, and access publicly available content across different storage platforms. s3viewer supports multiple storage protocols and cloud providers, making it useful for security assessments, compliance audits, and identifying potential data exposure risks in cloud environments.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.
S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
A tutorial demonstrating how to implement Kubernetes Engine security features to control application privileges through host access controls and network access policies.
A framework to analyze container images and gather useful information.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A setuid implementation of a subset of user namespaces, providing a way to run unprivileged containers without requiring root privileges.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.