Smogcloud Logo

Smogcloud

0
Free
Visit Website

Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to any capable security program. Smogcloud enables security engineers, penetration testers, and AWS administrators to monitor the collective changes that create dynamic and ephemeral internet-facing assets on a more frequent basis. It may be useful to identify Internet-facing FQDNs and IPs across one or hundreds of AWS accounts, misconfigurations or vulnerabilities, assets that are no longer in use, services not currently monitored, and shadow IT. To get started, install and setup golang, then install Smogcloud using the provided command. Set up AWS environment variables for the account you wish to query, and run the application.

FEATURES

ALTERNATIVES

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.

A command line tool that counts Amazon resources across regions and displays the results in a friendly format.

Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable fixes.

A framework to analyze container images and gather useful information.

Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.

A security toolkit for Amazon S3

An AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.

Export Kubernetes events for observability and alerting purposes with flexible routing options.