├── img
└── aws-security.png
├── .gitignore
├── LICENSE
└── README.md
/img/aws-security.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/paulveillard/cybersecurity-aws-tools/HEAD/img/aws-security.png
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | # Prerequisites
2 | *.d
3 |
4 | # Compiled Object files
5 | *.slo
6 | *.lo
7 | *.o
8 | *.obj
9 |
10 | # Precompiled Headers
11 | *.gch
12 | *.pch
13 |
14 | # Compiled Dynamic libraries
15 | *.so
16 | *.dylib
17 | *.dll
18 |
19 | # Fortran module files
20 | *.mod
21 | *.smod
22 |
23 | # Compiled Static libraries
24 | *.lai
25 | *.la
26 | *.a
27 | *.lib
28 |
29 | # Executables
30 | *.exe
31 | *.out
32 | *.app
33 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | Apache License
2 | Version 2.0, January 2004
3 | http://www.apache.org/licenses/
4 |
5 | TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
6 |
7 | 1. Definitions.
8 |
9 | "License" shall mean the terms and conditions for use, reproduction,
10 | and distribution as defined by Sections 1 through 9 of this document.
11 |
12 | "Licensor" shall mean the copyright owner or entity authorized by
13 | the copyright owner that is granting the License.
14 |
15 | "Legal Entity" shall mean the union of the acting entity and all
16 | other entities that control, are controlled by, or are under common
17 | control with that entity. For the purposes of this definition,
18 | "control" means (i) the power, direct or indirect, to cause the
19 | direction or management of such entity, whether by contract or
20 | otherwise, or (ii) ownership of fifty percent (50%) or more of the
21 | outstanding shares, or (iii) beneficial ownership of such entity.
22 |
23 | "You" (or "Your") shall mean an individual or Legal Entity
24 | exercising permissions granted by this License.
25 |
26 | "Source" form shall mean the preferred form for making modifications,
27 | including but not limited to software source code, documentation
28 | source, and configuration files.
29 |
30 | "Object" form shall mean any form resulting from mechanical
31 | transformation or translation of a Source form, including but
32 | not limited to compiled object code, generated documentation,
33 | and conversions to other media types.
34 |
35 | "Work" shall mean the work of authorship, whether in Source or
36 | Object form, made available under the License, as indicated by a
37 | copyright notice that is included in or attached to the work
38 | (an example is provided in the Appendix below).
39 |
40 | "Derivative Works" shall mean any work, whether in Source or Object
41 | form, that is based on (or derived from) the Work and for which the
42 | editorial revisions, annotations, elaborations, or other modifications
43 | represent, as a whole, an original work of authorship. For the purposes
44 | of this License, Derivative Works shall not include works that remain
45 | separable from, or merely link (or bind by name) to the interfaces of,
46 | the Work and Derivative Works thereof.
47 |
48 | "Contribution" shall mean any work of authorship, including
49 | the original version of the Work and any modifications or additions
50 | to that Work or Derivative Works thereof, that is intentionally
51 | submitted to Licensor for inclusion in the Work by the copyright owner
52 | or by an individual or Legal Entity authorized to submit on behalf of
53 | the copyright owner. For the purposes of this definition, "submitted"
54 | means any form of electronic, verbal, or written communication sent
55 | to the Licensor or its representatives, including but not limited to
56 | communication on electronic mailing lists, source code control systems,
57 | and issue tracking systems that are managed by, or on behalf of, the
58 | Licensor for the purpose of discussing and improving the Work, but
59 | excluding communication that is conspicuously marked or otherwise
60 | designated in writing by the copyright owner as "Not a Contribution."
61 |
62 | "Contributor" shall mean Licensor and any individual or Legal Entity
63 | on behalf of whom a Contribution has been received by Licensor and
64 | subsequently incorporated within the Work.
65 |
66 | 2. Grant of Copyright License. Subject to the terms and conditions of
67 | this License, each Contributor hereby grants to You a perpetual,
68 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable
69 | copyright license to reproduce, prepare Derivative Works of,
70 | publicly display, publicly perform, sublicense, and distribute the
71 | Work and such Derivative Works in Source or Object form.
72 |
73 | 3. Grant of Patent License. Subject to the terms and conditions of
74 | this License, each Contributor hereby grants to You a perpetual,
75 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable
76 | (except as stated in this section) patent license to make, have made,
77 | use, offer to sell, sell, import, and otherwise transfer the Work,
78 | where such license applies only to those patent claims licensable
79 | by such Contributor that are necessarily infringed by their
80 | Contribution(s) alone or by combination of their Contribution(s)
81 | with the Work to which such Contribution(s) was submitted. If You
82 | institute patent litigation against any entity (including a
83 | cross-claim or counterclaim in a lawsuit) alleging that the Work
84 | or a Contribution incorporated within the Work constitutes direct
85 | or contributory patent infringement, then any patent licenses
86 | granted to You under this License for that Work shall terminate
87 | as of the date such litigation is filed.
88 |
89 | 4. Redistribution. You may reproduce and distribute copies of the
90 | Work or Derivative Works thereof in any medium, with or without
91 | modifications, and in Source or Object form, provided that You
92 | meet the following conditions:
93 |
94 | (a) You must give any other recipients of the Work or
95 | Derivative Works a copy of this License; and
96 |
97 | (b) You must cause any modified files to carry prominent notices
98 | stating that You changed the files; and
99 |
100 | (c) You must retain, in the Source form of any Derivative Works
101 | that You distribute, all copyright, patent, trademark, and
102 | attribution notices from the Source form of the Work,
103 | excluding those notices that do not pertain to any part of
104 | the Derivative Works; and
105 |
106 | (d) If the Work includes a "NOTICE" text file as part of its
107 | distribution, then any Derivative Works that You distribute must
108 | include a readable copy of the attribution notices contained
109 | within such NOTICE file, excluding those notices that do not
110 | pertain to any part of the Derivative Works, in at least one
111 | of the following places: within a NOTICE text file distributed
112 | as part of the Derivative Works; within the Source form or
113 | documentation, if provided along with the Derivative Works; or,
114 | within a display generated by the Derivative Works, if and
115 | wherever such third-party notices normally appear. The contents
116 | of the NOTICE file are for informational purposes only and
117 | do not modify the License. You may add Your own attribution
118 | notices within Derivative Works that You distribute, alongside
119 | or as an addendum to the NOTICE text from the Work, provided
120 | that such additional attribution notices cannot be construed
121 | as modifying the License.
122 |
123 | You may add Your own copyright statement to Your modifications and
124 | may provide additional or different license terms and conditions
125 | for use, reproduction, or distribution of Your modifications, or
126 | for any such Derivative Works as a whole, provided Your use,
127 | reproduction, and distribution of the Work otherwise complies with
128 | the conditions stated in this License.
129 |
130 | 5. Submission of Contributions. Unless You explicitly state otherwise,
131 | any Contribution intentionally submitted for inclusion in the Work
132 | by You to the Licensor shall be under the terms and conditions of
133 | this License, without any additional terms or conditions.
134 | Notwithstanding the above, nothing herein shall supersede or modify
135 | the terms of any separate license agreement you may have executed
136 | with Licensor regarding such Contributions.
137 |
138 | 6. Trademarks. This License does not grant permission to use the trade
139 | names, trademarks, service marks, or product names of the Licensor,
140 | except as required for reasonable and customary use in describing the
141 | origin of the Work and reproducing the content of the NOTICE file.
142 |
143 | 7. Disclaimer of Warranty. Unless required by applicable law or
144 | agreed to in writing, Licensor provides the Work (and each
145 | Contributor provides its Contributions) on an "AS IS" BASIS,
146 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
147 | implied, including, without limitation, any warranties or conditions
148 | of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
149 | PARTICULAR PURPOSE. You are solely responsible for determining the
150 | appropriateness of using or redistributing the Work and assume any
151 | risks associated with Your exercise of permissions under this License.
152 |
153 | 8. Limitation of Liability. In no event and under no legal theory,
154 | whether in tort (including negligence), contract, or otherwise,
155 | unless required by applicable law (such as deliberate and grossly
156 | negligent acts) or agreed to in writing, shall any Contributor be
157 | liable to You for damages, including any direct, indirect, special,
158 | incidental, or consequential damages of any character arising as a
159 | result of this License or out of the use or inability to use the
160 | Work (including but not limited to damages for loss of goodwill,
161 | work stoppage, computer failure or malfunction, or any and all
162 | other commercial damages or losses), even if such Contributor
163 | has been advised of the possibility of such damages.
164 |
165 | 9. Accepting Warranty or Additional Liability. While redistributing
166 | the Work or Derivative Works thereof, You may choose to offer,
167 | and charge a fee for, acceptance of support, warranty, indemnity,
168 | or other liability obligations and/or rights consistent with this
169 | License. However, in accepting such obligations, You may act only
170 | on Your own behalf and on Your sole responsibility, not on behalf
171 | of any other Contributor, and only if You agree to indemnify,
172 | defend, and hold each Contributor harmless for any liability
173 | incurred by, or claims asserted against, such Contributor by reason
174 | of your accepting any such warranty or additional liability.
175 |
176 | END OF TERMS AND CONDITIONS
177 |
178 | APPENDIX: How to apply the Apache License to your work.
179 |
180 | To apply the Apache License to your work, attach the following
181 | boilerplate notice, with the fields enclosed by brackets "[]"
182 | replaced with your own identifying information. (Don't include
183 | the brackets!) The text should be enclosed in the appropriate
184 | comment syntax for the file format. We also recommend that a
185 | file or class name and description of purpose be included on the
186 | same "printed page" as the copyright notice for easier
187 | identification within third-party archives.
188 |
189 | Copyright [yyyy] [name of copyright owner]
190 |
191 | Licensed under the Apache License, Version 2.0 (the "License");
192 | you may not use this file except in compliance with the License.
193 | You may obtain a copy of the License at
194 |
195 | http://www.apache.org/licenses/LICENSE-2.0
196 |
197 | Unless required by applicable law or agreed to in writing, software
198 | distributed under the License is distributed on an "AS IS" BASIS,
199 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
200 | See the License for the specific language governing permissions and
201 | limitations under the License.
202 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # AWS Tools for Cybersecurity
2 |
3 | ###### Welcome to the World of AWS Tools in Cybersecurity:
4 | > A collection of awesome software, libraries, frameworks, learning tutorials, documents, books, resources and cool stuff about AWS tools.
5 | > Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.
6 |
7 | [AWS](https://aws.amazon.com/security/?nc=sn&loc=0) Tools for Cybersecurity is an ongoing curated list of tools, frameworks, libraries, learning tutorials for infosec and security professionals
8 |
9 | 
10 |
11 | ## Table of Contents
12 |
13 | - [Defensive](#defensive-hardening-security-assessment-and-inventory)
14 | - [Offensive](#offensive)
15 | - [Continuous Security Auditing](#continuous-security-auditing)
16 | - [Digital Forensics and Incident Response](#digital-forensics-and-incident-response)
17 | - [Development Security](#development-security)
18 | - [S3 Buckets Auditing](#s3-buckets-auditing)
19 | - [Training](#training)
20 | - [Other interesting tools/code](#other-interesting-toolscode)
21 |
22 |
23 | ## Defensive: Hardening, Security Assessment and Inventory
24 | | Name | URL | Description | Popularity | Metadata |
25 | | ---------- | :---------- | :---------- | :----------: | :----------: |
26 | | **ScoutSuite** | [https://github.com/nccgroup/ScoutSuite](https://github.com/nccgroup/ScoutSuite) | Multi-Cloud Security auditing tool for AWS Google Cloud and Azure environments (python) |[](https://badgen.net/github/stars/nccgroup/ScoutSuite)| [](https://badgen.net/github/contributors/nccgroup/ScoutSuite)[](https://badgen.net/github/watchers/nccgroup/ScoutSuite)[](https://badgen.net/github/last-commit/nccgroup/ScoutSuite) [](https://badgen.net/github/open-issues/nccgroup/ScoutSuite) [](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite) |
27 | | **Prowler** | [https://github.com/toniblyx/prowler](https://github.com/toniblyx/prowler) | CIS benchmarks and additional checks for security best practices in AWS (bash and python components) |[](https://badgen.net/github/stars/toniblyx/prowler)| [](https://badgen.net/github/contributors/toniblyx/prowler)[](https://badgen.net/github/watchers/toniblyx/prowler)[](https://badgen.net/github/last-commit/toniblyx/prowler) [](https://badgen.net/github/open-issues/toniblyx/prowler) [](https://badgen.net/github/closed-issues/toniblyx/prowler) |
28 | | **CloudSploit Scans** | [https://github.com/cloudsploit/scans](https://github.com/cloudsploit/scans) | AWS security scanning checks (NodeJS) |[](https://badgen.net/github/stars/cloudsploit/scans)| [](https://badgen.net/github/contributors/cloudsploit/scans)[](https://badgen.net/github/watchers/cloudsploit/scans)[](https://badgen.net/github/last-commit/cloudsploit/scans) [](https://badgen.net/github/open-issues/cloudsploit/scans) [](https://badgen.net/github/closed-issues/cloudsploit/scans) |
29 | | **CloudMapper** | [https://github.com/duo-labs/cloudmapper](https://github.com/duo-labs/cloudmapper) | helps you analyze your AWS environments (Python) |[](https://badgen.net/github/stars/duo-labs/cloudmapper)| [](https://badgen.net/github/contributors/duo-labs/cloudmapper)[](https://badgen.net/github/watchers/duo-labs/cloudmapper)[](https://badgen.net/github/last-commit/duo-labs/cloudmapper) [](https://badgen.net/github/open-issues/duo-labs/cloudmapper) [](https://badgen.net/github/closed-issues/duo-labs/cloudmapper) |
30 | | **CloudTracker** | [https://github.com/duo-labs/cloudtracker](https://github.com/duo-labs/cloudtracker) | helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python) |[](https://badgen.net/github/stars/duo-labs/cloudtracker)| [](https://badgen.net/github/contributors/duo-labs/cloudtracker)[](https://badgen.net/github/watchers/duo-labs/cloudtracker)[](https://badgen.net/github/last-commit/duo-labs/cloudtracker) [](https://badgen.net/github/open-issues/duo-labs/cloudtracker) [](https://badgen.net/github/closed-issues/duo-labs/cloudtracker) |
31 | | **AWS Security Benchmarks** | [https://github.com/awslabs/aws-security-benchmark](https://github.com/awslabs/aws-security-benchmark) | scripts and templates guidance related to the AWS CIS Foundation framework (Python) |[](https://badgen.net/github/stars/awslabs/aws-security-benchmark)| [](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)[](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)[](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark) [](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark) [](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark) |
32 | | **AWS Public IPs** | [https://github.com/arkadiyt/aws_public_ips](https://github.com/arkadiyt/aws_public_ips) | Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6 Classic/VPC networking and across all AWS services (Ruby) |[](https://badgen.net/github/stars/arkadiyt/aws_public_ips)| [](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)[](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)[](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips) [](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips) [](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips) |
33 | | **PMapper** | [https://github.com/nccgroup/PMapper](https://github.com/nccgroup/PMapper) | Advanced and Automated AWS IAM Evaluation (Python) |[](https://badgen.net/github/stars/nccgroup/PMapper)| [](https://badgen.net/github/contributors/nccgroup/PMapper)[](https://badgen.net/github/watchers/nccgroup/PMapper)[](https://badgen.net/github/last-commit/nccgroup/PMapper) [](https://badgen.net/github/open-issues/nccgroup/PMapper) [](https://badgen.net/github/closed-issues/nccgroup/PMapper) |
34 | | **nccgroup AWS-Inventory** | [https://github.com/nccgroup/aws-inventory](https://github.com/nccgroup/aws-inventory) | Make a inventory of all your resources across regions (Python) |[](https://badgen.net/github/stars/nccgroup/aws-inventory)| [](https://badgen.net/github/contributors/nccgroup/aws-inventory)[](https://badgen.net/github/watchers/nccgroup/aws-inventory)[](https://badgen.net/github/last-commit/nccgroup/aws-inventory) [](https://badgen.net/github/open-issues/nccgroup/aws-inventory) [](https://badgen.net/github/closed-issues/nccgroup/aws-inventory) |
35 | | **Resource Counter** | [https://github.com/disruptops/resource-counter](https://github.com/disruptops/resource-counter) | Counts number of resources in categories across regions |[](https://badgen.net/github/stars/disruptops/resource-counter)| [](https://badgen.net/github/contributors/disruptops/resource-counter)[](https://badgen.net/github/watchers/disruptops/resource-counter)[](https://badgen.net/github/last-commit/disruptops/resource-counter) [](https://badgen.net/github/open-issues/disruptops/resource-counter) [](https://badgen.net/github/closed-issues/disruptops/resource-counter) |
36 | | **ICE** | [https://github.com/Teevity/ice](https://github.com/Teevity/ice) | Ice provides insights from a usage and cost perspective with high detail dashboards. |[](https://badgen.net/github/stars/Teevity/ice)| [](https://badgen.net/github/contributors/Teevity/ice)[](https://badgen.net/github/watchers/Teevity/ice)[](https://badgen.net/github/last-commit/Teevity/ice) [](https://badgen.net/github/open-issues/Teevity/ice) [](https://badgen.net/github/closed-issues/Teevity/ice) |
37 | | **SkyArk** | [https://github.com/cyberark/SkyArk](https://github.com/cyberark/SkyArk) | SkyArk provides advanced discovery and security assessment for the most privileged entities in the tested AWS. |[](https://badgen.net/github/stars/cyberark/SkyArk)| [](https://badgen.net/github/contributors/cyberark/SkyArk)[](https://badgen.net/github/watchers/cyberark/SkyArk)[](https://badgen.net/github/last-commit/cyberark/SkyArk) [](https://badgen.net/github/open-issues/cyberark/SkyArk) [](https://badgen.net/github/closed-issues/cyberark/SkyArk) |
38 | | **Trailblazer AWS** | [https://github.com/willbengtson/trailblazer-aws](https://github.com/willbengtson/trailblazer-aws) | Trailblazer AWS determine what AWS API calls are logged by CloudTrail and what they are logged as. You can also use TrailBlazer as an attack simulation framework. |[](https://badgen.net/github/stars/willbengtson/trailblazer-aws)| [](https://badgen.net/github/contributors/willbengtson/trailblazer-aws)[](https://badgen.net/github/watchers/willbengtson/trailblazer-aws)[](https://badgen.net/github/last-commit/willbengtson/trailblazer-aws) [](https://badgen.net/github/open-issues/willbengtson/trailblazer-aws) [](https://badgen.net/github/closed-issues/willbengtson/trailblazer-aws) |
39 | | **Lunar** | [https://github.com/lateralblast/lunar](https://github.com/lateralblast/lunar) | Security auditing tool based on several security frameworks (it does some AWS checks) |[](https://badgen.net/github/stars/lateralblast/lunar)| [](https://badgen.net/github/contributors/lateralblast/lunar)[](https://badgen.net/github/watchers/lateralblast/lunar)[](https://badgen.net/github/last-commit/lateralblast/lunar) [](https://badgen.net/github/open-issues/lateralblast/lunar) [](https://badgen.net/github/closed-issues/lateralblast/lunar) |
40 | | **Cloud-reports** | [https://github.com/tensult/cloud-reports](https://github.com/tensult/cloud-reports) | Scans your AWS cloud resources and generates reports |[](https://badgen.net/github/stars/tensult/cloud-reports)| [](https://badgen.net/github/contributors/tensult/cloud-reports)[](https://badgen.net/github/watchers/tensult/cloud-reports)[](https://badgen.net/github/last-commit/tensult/cloud-reports) [](https://badgen.net/github/open-issues/tensult/cloud-reports) [](https://badgen.net/github/closed-issues/tensult/cloud-reports) |
41 | | **Pacbot** | [https://github.com/tmobile/pacbot](https://github.com/tmobile/pacbot) | Platform for continuous compliance monitoring compliance reporting and security automation for the cloud |[](https://badgen.net/github/stars/tmobile/pacbot)| [](https://badgen.net/github/contributors/tmobile/pacbot)[](https://badgen.net/github/watchers/tmobile/pacbot)[](https://badgen.net/github/last-commit/tmobile/pacbot) [](https://badgen.net/github/open-issues/tmobile/pacbot) [](https://badgen.net/github/closed-issues/tmobile/pacbot) |
42 | | **cs-suite** | [https://github.com/SecurityFTW/cs-suite](https://github.com/SecurityFTW/cs-suite) | Integrates tools like Scout2 and Prowler among others |[](https://badgen.net/github/stars/SecurityFTW/cs-suite)| [](https://badgen.net/github/contributors/SecurityFTW/cs-suite)[](https://badgen.net/github/watchers/SecurityFTW/cs-suite)[](https://badgen.net/github/last-commit/SecurityFTW/cs-suite) [](https://badgen.net/github/open-issues/SecurityFTW/cs-suite) [](https://badgen.net/github/closed-issues/SecurityFTW/cs-suite) |
43 | | **aws-key-disabler** | [https://github.com/te-papa/aws-key-disabler](https://github.com/te-papa/aws-key-disabler) | A small lambda script that will disable access keys older than a given amount of days |[](https://badgen.net/github/stars/te-papa/aws-key-disabler)| [](https://badgen.net/github/contributors/te-papa/aws-key-disabler)[](https://badgen.net/github/watchers/te-papa/aws-key-disabler)[](https://badgen.net/github/last-commit/te-papa/aws-key-disabler) [](https://badgen.net/github/open-issues/te-papa/aws-key-disabler) [](https://badgen.net/github/closed-issues/te-papa/aws-key-disabler) |
44 | | **Antiope** | [https://github.com/turnerlabs/antiope](https://github.com/turnerlabs/antiope) | AWS Inventory and Compliance Framework |[](https://badgen.net/github/stars/turnerlabs/antiope)| [](https://badgen.net/github/contributors/turnerlabs/antiope)[](https://badgen.net/github/watchers/turnerlabs/antiope)[](https://badgen.net/github/last-commit/turnerlabs/antiope) [](https://badgen.net/github/open-issues/turnerlabs/antiope) [](https://badgen.net/github/closed-issues/turnerlabs/antiope) |
45 | | **Cloud Reports** | [https://github.com/tensult/cloud-reports](https://github.com/tensult/cloud-reports) | Scans your AWS cloud resources and generates reports and includes security best practices. |[](https://badgen.net/github/stars/tensult/cloud-reports)| [](https://badgen.net/github/contributors/tensult/cloud-reports)[](https://badgen.net/github/watchers/tensult/cloud-reports)[](https://badgen.net/github/last-commit/tensult/cloud-reports) [](https://badgen.net/github/open-issues/tensult/cloud-reports) [](https://badgen.net/github/closed-issues/tensult/cloud-reports) |
46 | | **Terraform AWS Secure Baseline** | [https://github.com/nozaq/terraform-aws-secure-baseline](https://github.com/nozaq/terraform-aws-secure-baseline) | Terraform module to set up your AWS account with the secure |[](https://badgen.net/github/stars/nozaq/terraform-aws-secure-baseline)| [](https://badgen.net/github/contributors/nozaq/terraform-aws-secure-baseline)[](https://badgen.net/github/watchers/nozaq/terraform-aws-secure-baseline)[](https://badgen.net/github/last-commit/nozaq/terraform-aws-secure-baseline) [](https://badgen.net/github/open-issues/nozaq/terraform-aws-secure-baseline) [](https://badgen.net/github/closed-issues/nozaq/terraform-aws-secure-baseline) |
47 | | **Cartography** | [https://github.com/lyft/cartography](https://github.com/lyft/cartography) | Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database. |[](https://badgen.net/github/stars/lyft/cartography)| [](https://badgen.net/github/contributors/lyft/cartography)[](https://badgen.net/github/watchers/lyft/cartography)[](https://badgen.net/github/last-commit/lyft/cartography) [](https://badgen.net/github/open-issues/lyft/cartography) [](https://badgen.net/github/closed-issues/lyft/cartography) |
48 | | **TrailScraper** | [https://github.com/flosell/trailscraper](https://github.com/flosell/trailscraper) | A command-line tool to get valuable information out of AWS CloudTrail |[](https://badgen.net/github/stars/flosell/trailscraper)| [](https://badgen.net/github/contributors/flosell/trailscraper)[](https://badgen.net/github/watchers/flosell/trailscraper)[](https://badgen.net/github/last-commit/flosell/trailscraper) [](https://badgen.net/github/open-issues/flosell/trailscraper) [](https://badgen.net/github/closed-issues/flosell/trailscraper) |
49 | | **LambdaGuard** | [https://github.com/Skyscanner/LambdaGuard](https://github.com/Skyscanner/LambdaGuard) | An AWS Lambda auditing tool designed to create asset visibility and provide actionable results. |[](https://badgen.net/github/stars/Skyscanner/LambdaGuard)| [](https://badgen.net/github/contributors/Skyscanner/LambdaGuard)[](https://badgen.net/github/watchers/Skyscanner/LambdaGuard)[](https://badgen.net/github/last-commit/Skyscanner/LambdaGuard) [](https://badgen.net/github/open-issues/Skyscanner/LambdaGuard) [](https://badgen.net/github/closed-issues/Skyscanner/LambdaGuard) |
50 | | **Komiser** | [https://github.com/mlabouardy/komiser](https://github.com/mlabouardy/komiser) | Cloud Environment Inspector analyze and manage cloud cost usage security and governance in one place. |[](https://badgen.net/github/stars/mlabouardy/komiser)| [](https://badgen.net/github/contributors/mlabouardy/komiser)[](https://badgen.net/github/watchers/mlabouardy/komiser)[](https://badgen.net/github/last-commit/mlabouardy/komiser) [](https://badgen.net/github/open-issues/mlabouardy/komiser) [](https://badgen.net/github/closed-issues/mlabouardy/komiser) |
51 | | **Perimeterator** | [https://github.com/darkarnium/perimeterator](https://github.com/darkarnium/perimeterator) | AWS perimeter monitoring. Periodically scan internet facing AWS resources to detect misconfigured services |[](https://badgen.net/github/stars/darkarnium/perimeterator)| [](https://badgen.net/github/contributors/darkarnium/perimeterator)[](https://badgen.net/github/watchers/darkarnium/perimeterator)[](https://badgen.net/github/last-commit/darkarnium/perimeterator) [](https://badgen.net/github/open-issues/darkarnium/perimeterator) [](https://badgen.net/github/closed-issues/darkarnium/perimeterator) |
52 | | **PolicySentry** | [https://github.com/salesforce/policy_sentry](https://github.com/salesforce/policy_sentry) | IAM Least Privilege Policy Generator auditor and analysis database |[](https://badgen.net/github/stars/salesforce/policy_sentry)| [](https://badgen.net/github/contributors/salesforce/policy_sentry)[](https://badgen.net/github/watchers/salesforce/policy_sentry)[](https://badgen.net/github/last-commit/salesforce/policy_sentry) [](https://badgen.net/github/open-issues/salesforce/policy_sentry) [](https://badgen.net/github/closed-issues/salesforce/policy_sentry) |
53 | | **Zeus** | [https://github.com/DenizParlak/Zeus](https://github.com/DenizParlak/Zeus) | AWS Auditing & Hardening Tool |[](https://badgen.net/github/stars/DenizParlak/Zeus)| [](https://badgen.net/github/contributors/DenizParlak/Zeus)[](https://badgen.net/github/watchers/DenizParlak/Zeus)[](https://badgen.net/github/last-commit/DenizParlak/Zeus) [](https://badgen.net/github/open-issues/DenizParlak/Zeus) [](https://badgen.net/github/closed-issues/DenizParlak/Zeus) |
54 | | **janiko71 AWS-inventory** | [https://github.com/janiko71/aws-inventory](https://github.com/janiko71/aws-inventory) | Python script for AWS resources inventory |[](https://badgen.net/github/stars/janiko71/aws-inventory)| [](https://badgen.net/github/contributors/janiko71/aws-inventory)[](https://badgen.net/github/watchers/janiko71/aws-inventory)[](https://badgen.net/github/last-commit/janiko71/aws-inventory) [](https://badgen.net/github/open-issues/janiko71/aws-inventory) [](https://badgen.net/github/closed-issues/janiko71/aws-inventory) |
55 | | **awspx** | [https://github.com/fsecurelabs/awspx](https://github.com/fsecurelabs/awspx) | A graph-based tool for visualizing effective access and resource relationships in AWS environments |[](https://badgen.net/github/stars/fsecurelabs/awspx)| [](https://badgen.net/github/contributors/fsecurelabs/awspx)[](https://badgen.net/github/watchers/fsecurelabs/awspx)[](https://badgen.net/github/last-commit/fsecurelabs/awspx) [](https://badgen.net/github/open-issues/fsecurelabs/awspx) [](https://badgen.net/github/closed-issues/fsecurelabs/awspx) |
56 | | **clinv** | [https://github.com/lyz-code/clinv](https://github.com/lyz-code/clinv) | DevSecOps command line asset inventory tool |[](https://badgen.net/github/stars/lyz-code/clinv)| [](https://badgen.net/github/contributors/lyz-code/clinv)[](https://badgen.net/github/watchers/lyz-code/clinv)[](https://badgen.net/github/last-commit/lyz-code/clinv) [](https://badgen.net/github/open-issues/lyz-code/clinv) [](https://badgen.net/github/closed-issues/lyz-code/clinv) |
57 | | **aws-gate** | [https://github.com/xen0l/aws-gate](https://github.com/xen0l/aws-gate) | Enhanced AWS SSM Session manager CLI client |[](https://badgen.net/github/stars/xen0l/aws-gate)| [](https://badgen.net/github/contributors/xen0l/aws-gate) [](https://badgen.net/github/watchers/xen0l/aws-gate) [](https://badgen.net/github/last-commit/xen0l/aws-gate) [](https://badgen.net/github/open-issues/xen0l/aws-gate) [](https://badgen.net/github/closed-issues/xen0l/aws-gate) |
58 | | **Detecting Credential Compromise** | [https://github.com/Netflix-Skunkworks/aws-credential-compromise-detection](https://github.com/Netflix-Skunkworks/aws-credential-compromise-detection) | Detecting of your compromised credential in AWS |[](https://badgen.net/github/stars/Netflix-Skunkworks/aws-credential-compromise-detection)| [](https://badgen.net/github/contributors/Netflix-Skunkworks/aws-credential-compromise-detection)[](https://badgen.net/github/watchers/Netflix-Skunkworks/aws-credential-compromise-detection)[](https://badgen.net/github/last-commit/Netflix-Skunkworks/aws-credential-compromise-detection) [](https://badgen.net/github/open-issues/Netflix-Skunkworks/aws-credential-compromise-detection) [](https://badgen.net/github/closed-issues/Netflix-Skunkworks/aws-credential-compromise-detection)|
59 | | **AWS-Security-Toolbox (AST)** | [https://github.com/z0ph/aws-security-toolbox](https://github.com/z0ph/aws-security-toolbox) | AWS Security Toolbox (Docker Image) for Security Assessments |[](https://badgen.net/github/stars/z0ph/aws-security-toolbox)| [](https://badgen.net/github/contributors/z0ph/aws-security-toolbox) [](https://badgen.net/github/watchers/z0ph/aws-security-toolbox) [](https://badgen.net/github/last-commit/z0ph/aws-security-toolbox) [](https://badgen.net/github/open-issues/z0ph/aws-security-toolbox) [](https://badgen.net/github/closed-issues/z0ph/aws-security-toolbox) |
60 | | **iam-lint** | [https://github.com/xen0l/iam-lint](https://github.com/xen0l/iam-lint) | Github action for linting AWS IAM policy documents for correctness and possible security issues |[](https://badgen.net/github/stars/xen0l/iam-lint)| [](https://badgen.net/github/contributors/xen0l/iam-lint) [](https://badgen.net/github/watchers/xen0l/iam-lint) [](https://badgen.net/github/last-commit/xen0l/iam-lint) [](https://badgen.net/github/open-issues/xen0l/iam-lint) [](https://badgen.net/github/closed-issues/xen0l/iam-lint) |
61 | | **aws-security-viz** | [https://github.com/anaynayak/aws-security-viz](https://github.com/anaynayak/aws-security-viz) | A tool to visualize aws security groups. |[](https://badgen.net/github/stars/anaynayak/aws-security-viz)| [](https://badgen.net/github/contributors/anaynayak/aws-security-viz) [](https://badgen.net/github/watchers/anaynayak/aws-security-viz) [](https://badgen.net/github/last-commit/anaynayak/aws-security-viz) [](https://badgen.net/github/open-issues/anaynayak/aws-security-viz) [](https://badgen.net/github/closed-issues/anaynayak/aws-security-viz) |
62 | | **AirIAM** | [https://github.com/bridgecrewio/AirIAM](https://github.com/bridgecrewio/AirIAM) | Least privilege AWS IAM using Terraform |[](https://badgen.net/github/stars/bridgecrewio/AirIAM)| [](https://badgen.net/github/contributors/bridgecrewio/AirIAM) [](https://badgen.net/github/watchers/bridgecrewio/AirIAM) [](https://badgen.net/github/last-commit/bridgecrewio/AirIAM) [](https://badgen.net/github/open-issues/bridgecrewio/AirIAM) [](https://badgen.net/github/closed-issues/bridgecrewio/AirIAM) |
63 | | **Cloudsplaining** | [https://github.com/salesforce/cloudsplaining](https://github.com/salesforce/cloudsplaining) | AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report. |[](https://badgen.net/github/stars/salesforce/cloudsplaining)| [](https://badgen.net/github/contributors/salesforce/cloudsplaining) [](https://badgen.net/github/watchers/salesforce/cloudsplaining) [](https://badgen.net/github/last-commit/salesforce/cloudsplaining) [](https://badgen.net/github/open-issues/salesforce/cloudsplaining) [](https://badgen.net/github/closed-issues/salesforce/cloudsplaining) |
64 | | **iam-policy-generator** | [https://github.com/aletheia/iam-policy-generator](https://github.com/aletheia/iam-policy-generator) | A simple library to generate IAM policy statements with no need to remember all the actions APIs | [](https://badgen.net/github/stars/aletheia/iam-policy-generator) | [](https://badgen.net/github/contributors/aletheia/iam-policy-generator) [](https://badgen.net/github/watchers/aletheia/iam-policy-generator) [](https://badgen.net/github/last-commit/aletheia/iam-policy-generator) [](https://badgen.net/github/open-issues/aletheia/iam-policy-generator) [](https://badgen.net/github/closed-issues/aletheia/iam-policy-generator) |
65 | | **SkyWrapper** | [https://github.com/cyberark/SkyWrapper](https://github.com/cyberark/SkyWrapper) | SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS | [](https://badgen.net/github/stars/cyberark/SkyWrapper) | [](https://badgen.net/github/contributors/cyberark/SkyWrapper) [](https://badgen.net/github/watchers/cyberark/SkyWrapper) [](https://badgen.net/github/last-commit/cyberark/SkyWrapper) [](https://badgen.net/github/open-issues/cyberark/SkyWrapper) [](https://badgen.net/github/closed-issues/cyberark/SkyWrapper) |
66 | | **aws-recon** | [https://github.com/darkbitio/aws-recon](https://github.com/darkbitio/aws-recon) | Multi-threaded AWS inventory collection tool | [](https://badgen.net/github/stars/darkbitio/aws-recon) | [](https://badgen.net/github/contributors/darkbitio/aws-recon) [](https://badgen.net/github/watchers/darkbitio/aws-recon) [](https://badgen.net/github/last-commit/darkbitio/aws-recon) [](https://badgen.net/github/open-issues/darkbitio/aws-recon) [](https://badgen.net/github/closed-issues/darkbitio/aws-recon) |
67 | | **iam-policies-cli** | [https://github.com/mhlabs/iam-policies-cli](https://github.com/mhlabs/iam-policies-cli) | A CLI tool for building simple to complex IAM policies | [](https://badgen.net/github/stars/mhlabs/iam-policies-cli) | [](https://badgen.net/github/contributors/mhlabs/iam-policies-cli) [](https://badgen.net/github/watchers/mhlabs/iam-policies-cli) [](https://badgen.net/github/last-commit/mhlabs/iam-policies-cli) [](https://badgen.net/github/open-issues/mhlabs/iam-policies-cli) [](https://badgen.net/github/closed-issues/mhlabs/iam-policies-cli) |
68 | | **Aaia** | [https://github.com/rams3sh/Aaia](https://github.com/rams3sh/Aaia) | AWS Identity and Access Management Visualizer and Anomaly Finder | [](https://badgen.net/github/stars/rams3sh/Aaia) | [](https://badgen.net/github/contributors/rams3sh/Aaia) [](https://badgen.net/github/watchers/rams3sh/Aaia) [](https://badgen.net/github/last-commit/rams3sh/Aaia) [](https://badgen.net/github/open-issues/rams3sh/Aaia) [](https://badgen.net/github/closed-issues/rams3sh/Aaia) |
69 | | **iam-floyd** | [https://github.com/udondan/iam-floyd](https://github.com/udondan/iam-floyd) | IAM policy statement generator with fluent interface - Available for Node.js, Python, .Net and Java | [](https://badgen.net/github/stars/udondan/iam-floyd) | [](https://badgen.net/github/contributors/udondan/iam-floyd) [](https://badgen.net/github/watchers/udondan/iam-floyd) [](https://badgen.net/github/last-commit/udondan/iam-floyd) [](https://badgen.net/github/open-issues/udondan/iam-floyd) [](https://badgen.net/github/closed-issues/udondan/iam-floyd) |
70 | | **rpCheckup** | [https://github.com/goldfiglabs/rpCheckup](https://github.com/goldfiglabs/rpCheckup) | AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources. | [](https://badgen.net/github/stars/goldfiglabs/rpCheckup) | [](https://badgen.net/github/contributors/goldfiglabs/rpCheckup) [](https://badgen.net/github/watchers/goldfiglabs/rpCheckup) [](https://badgen.net/github/last-commit/goldfiglabs/rpCheckup) [](https://badgen.net/github/open-issues/goldfiglabs/rpCheckup) [](https://badgen.net/github/closed-issues/goldfiglabs/rpCheckup) |
71 | | **S3 Exif Cleaner** | [https://github.com/seisvelas/S3-Exif-Cleaner](https://github.com/seisvelas/S3-Exif-Cleaner) | Remove EXIF data from all objects in an S3 bucket |[](https://badgen.net/github/stars/seisvelas/S3-Exif-Cleaner)| [](https://badgen.net/github/contributors/seisvelas/S3-Exif-Cleaner)[](https://badgen.net/github/watchers/seisvelas/S3-Exif-Cleaner)[](https://badgen.net/github/last-commit/seisvelas/S3-Exif-Cleaner) [](https://badgen.net/github/open-issues/seisvelas/S3-Exif-Cleaner) [](https://badgen.net/github/closed-issues/seisvelas/S3-Exif-Cleaner) |
72 | | **Steampipe** | [https://github.com/turbot/steampipe](https://github.com/turbot/steampipe) | Use SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required. (SQL) |[](https://badgen.net/github/stars/turbot/steampipe)| [](https://badgen.net/github/contributors/turbot/steampipe)[](https://badgen.net/github/watchers/turbot/steampipe)[](https://badgen.net/github/last-commit/turbot/steampipe/main) [](https://badgen.net/github/open-issues/turbot/steampipe) [](https://badgen.net/github/closed-issues/turbot/steampipe) |
73 |
74 | ## Offensive
75 | | Name | URL | Description | Popularity | Metadata |
76 | | ---------- | :---------- | :---------- | :----------: | :----------: |
77 | | **WeirdAAL** | [https://github.com/carnal0wnage/weirdAAL](https://github.com/carnal0wnage/weirdAAL) | AWS Attack Library |[](https://badgen.net/github/stars/carnal0wnage/weirdAAL)| [](https://badgen.net/github/contributors/carnal0wnage/weirdAAL)[](https://badgen.net/github/watchers/carnal0wnage/weirdAAL)[](https://badgen.net/github/last-commit/carnal0wnage/weirdAAL) [](https://badgen.net/github/open-issues/carnal0wnage/weirdAAL) [](https://badgen.net/github/closed-issues/carnal0wnage/weirdAAL) |
78 | | **Pacu** | [https://github.com/RhinoSecurityLabs/pacu](https://github.com/RhinoSecurityLabs/pacu) | AWS penetration testing toolkit |[](https://badgen.net/github/stars/RhinoSecurityLabs/pacu)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/pacu)[](https://badgen.net/github/watchers/RhinoSecurityLabs/pacu)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/pacu) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/pacu) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/pacu) |
79 | | **Cred Scanner** | [https://github.com/disruptops/cred_scanner](https://github.com/disruptops/cred_scanner) | A simple file-based scanner to look for potential AWS access and secret keys in files |[](https://badgen.net/github/stars/disruptops/cred_scanner)| [](https://badgen.net/github/contributors/disruptops/cred_scanner)[](https://badgen.net/github/watchers/disruptops/cred_scanner)[](https://badgen.net/github/last-commit/disruptops/cred_scanner) [](https://badgen.net/github/open-issues/disruptops/cred_scanner) [](https://badgen.net/github/closed-issues/disruptops/cred_scanner) |
80 | | **AWS PWN** | [https://github.com/dagrz/aws_pwn](https://github.com/dagrz/aws_pwn) | A collection of AWS penetration testing junk |[](https://badgen.net/github/stars/dagrz/aws_pwn)| [](https://badgen.net/github/contributors/dagrz/aws_pwn)[](https://badgen.net/github/watchers/dagrz/aws_pwn)[](https://badgen.net/github/last-commit/dagrz/aws_pwn) [](https://badgen.net/github/open-issues/dagrz/aws_pwn) [](https://badgen.net/github/closed-issues/dagrz/aws_pwn) |
81 | | **Cloudfrunt** | [https://github.com/MindPointGroup/cloudfrunt](https://github.com/MindPointGroup/cloudfrunt) | A tool for identifying misconfigured CloudFront domains |[](https://badgen.net/github/stars/MindPointGroup/cloudfrunt)| [](https://badgen.net/github/contributors/MindPointGroup/cloudfrunt)[](https://badgen.net/github/watchers/MindPointGroup/cloudfrunt)[](https://badgen.net/github/last-commit/MindPointGroup/cloudfrunt) [](https://badgen.net/github/open-issues/MindPointGroup/cloudfrunt) [](https://badgen.net/github/closed-issues/MindPointGroup/cloudfrunt) |
82 | | **Cloudjack** | [https://github.com/prevade/cloudjack](https://github.com/prevade/cloudjack) | Route53/CloudFront Vulnerability Assessment Utility |[](https://badgen.net/github/stars/prevade/cloudjack)| [](https://badgen.net/github/contributors/prevade/cloudjack)[](https://badgen.net/github/watchers/prevade/cloudjack)[](https://badgen.net/github/last-commit/prevade/cloudjack) [](https://badgen.net/github/open-issues/prevade/cloudjack) [](https://badgen.net/github/closed-issues/prevade/cloudjack) |
83 | | **Nimbostratus** | [https://github.com/andresriancho/nimbostratus](https://github.com/andresriancho/nimbostratus) | Tools for fingerprinting and exploiting Amazon cloud infrastructures |[](https://badgen.net/github/stars/andresriancho/nimbostratus)| [](https://badgen.net/github/contributors/andresriancho/nimbostratus)[](https://badgen.net/github/watchers/andresriancho/nimbostratus)[](https://badgen.net/github/last-commit/andresriancho/nimbostratus) [](https://badgen.net/github/open-issues/andresriancho/nimbostratus) [](https://badgen.net/github/closed-issues/andresriancho/nimbostratus) |
84 | | **GitLeaks** | [https://github.com/zricethezav/gitleaks](https://github.com/zricethezav/gitleaks) | Audit git repos for secrets |[](https://badgen.net/github/stars/zricethezav/gitleaks)| [](https://badgen.net/github/contributors/zricethezav/gitleaks)[](https://badgen.net/github/watchers/zricethezav/gitleaks)[](https://badgen.net/github/last-commit/zricethezav/gitleaks) [](https://badgen.net/github/open-issues/zricethezav/gitleaks) [](https://badgen.net/github/closed-issues/zricethezav/gitleaks) |
85 | | **TruffleHog** | [https://github.com/dxa4481/truffleHog](https://github.com/dxa4481/truffleHog) | Searches through git repositories for high entropy strings and secrets digging deep into commit history |[](https://badgen.net/github/stars/dxa4481/truffleHog)| [](https://badgen.net/github/contributors/dxa4481/truffleHog)[](https://badgen.net/github/watchers/dxa4481/truffleHog)[](https://badgen.net/github/last-commit/dxa4481/truffleHog) [](https://badgen.net/github/open-issues/dxa4481/truffleHog) [](https://badgen.net/github/closed-issues/dxa4481/truffleHog) |
86 | | **DumpsterDiver** | [https://github.com/securing/DumpsterDiver](https://github.com/securing/DumpsterDiver) | "Tool to search secrets in various filetypes like keys (e.g. AWS Access Key Azure Share Key or SSH keys) or passwords." |[](https://badgen.net/github/stars/securing/DumpsterDiver)| [](https://badgen.net/github/contributors/securing/DumpsterDiver)[](https://badgen.net/github/watchers/securing/DumpsterDiver)[](https://badgen.net/github/last-commit/securing/DumpsterDiver) [](https://badgen.net/github/open-issues/securing/DumpsterDiver) [](https://badgen.net/github/closed-issues/securing/DumpsterDiver) |
87 | | **Mad-King** | [https://github.com/ThreatResponse/mad-king](https://github.com/ThreatResponse/mad-king) | Proof of Concept Zappa Based AWS Persistence and Attack Platform |[](https://badgen.net/github/stars/ThreatResponse/mad-king)| [](https://badgen.net/github/contributors/ThreatResponse/mad-king)[](https://badgen.net/github/watchers/ThreatResponse/mad-king)[](https://badgen.net/github/last-commit/ThreatResponse/mad-king) [](https://badgen.net/github/open-issues/ThreatResponse/mad-king) [](https://badgen.net/github/closed-issues/ThreatResponse/mad-king) |
88 | | **Cloud-Nuke** | [https://github.com/gruntwork-io/cloud-nuke](https://github.com/gruntwork-io/cloud-nuke) | A tool for cleaning up your cloud accounts by nuking (deleting) all resources within it |[](https://badgen.net/github/stars/gruntwork-io/cloud-nuke)| [](https://badgen.net/github/contributors/gruntwork-io/cloud-nuke)[](https://badgen.net/github/watchers/gruntwork-io/cloud-nuke)[](https://badgen.net/github/last-commit/gruntwork-io/cloud-nuke) [](https://badgen.net/github/open-issues/gruntwork-io/cloud-nuke) [](https://badgen.net/github/closed-issues/gruntwork-io/cloud-nuke) |
89 | | **MozDef - The Mozilla Defense Platform** | [https://github.com/mozilla/MozDef](https://github.com/mozilla/MozDef) | The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers. |[](https://badgen.net/github/stars/mozilla/MozDef)| [](https://badgen.net/github/contributors/mozilla/MozDef)[](https://badgen.net/github/watchers/mozilla/MozDef)[](https://badgen.net/github/last-commit/mozilla/MozDef) [](https://badgen.net/github/open-issues/mozilla/MozDef) [](https://badgen.net/github/closed-issues/mozilla/MozDef) |
90 | | **Lambda-Proxy** | [https://github.com/puresec/lambda-proxy](https://github.com/puresec/lambda-proxy) | A bridge between SQLMap and AWS Lambda which lets you use SQLMap to natively test AWS Lambda functions for SQL Injection vulnerabilities. |[](https://badgen.net/github/stars/puresec/lambda-proxy)| [](https://badgen.net/github/contributors/puresec/lambda-proxy)[](https://badgen.net/github/watchers/puresec/lambda-proxy)[](https://badgen.net/github/last-commit/puresec/lambda-proxy) [](https://badgen.net/github/open-issues/puresec/lambda-proxy) [](https://badgen.net/github/closed-issues/puresec/lambda-proxy) |
91 | | **CloudCopy** | [https://github.com/Static-Flow/CloudCopy](https://github.com/Static-Flow/CloudCopy) | Cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permission |[](https://badgen.net/github/stars/Static-Flow/CloudCopy)| [](https://badgen.net/github/contributors/Static-Flow/CloudCopy)[](https://badgen.net/github/watchers/Static-Flow/CloudCopy)[](https://badgen.net/github/last-commit/Static-Flow/CloudCopy) [](https://badgen.net/github/open-issues/Static-Flow/CloudCopy) [](https://badgen.net/github/closed-issues/Static-Flow/CloudCopy) |
92 | | **enumerate-iam** | [https://github.com/andresriancho/enumerate-iam](https://github.com/andresriancho/enumerate-iam) | Enumerate the permissions associated with AWS credential set |[](https://badgen.net/github/stars/andresriancho/enumerate-iam)| [](https://badgen.net/github/contributors/andresriancho/enumerate-iam)[](https://badgen.net/github/watchers/andresriancho/enumerate-iam)[](https://badgen.net/github/last-commit/andresriancho/enumerate-iam) [](https://badgen.net/github/open-issues/andresriancho/enumerate-iam) [](https://badgen.net/github/closed-issues/andresriancho/enumerate-iam) |
93 | | **Barq** | [https://github.com/Voulnet/barq](https://github.com/Voulnet/barq) | A post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure |[](https://badgen.net/github/stars/Voulnet/barq)| [](https://badgen.net/github/contributors/Voulnet/barq)[](https://badgen.net/github/watchers/Voulnet/barq)[](https://badgen.net/github/last-commit/Voulnet/barq) [](https://badgen.net/github/open-issues/Voulnet/barq) [](https://badgen.net/github/closed-issues/Voulnet/barq) |
94 | | **CCAT** | [https://github.com/RhinoSecurityLabs/ccat](https://github.com/RhinoSecurityLabs/ccat) | Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments |[](https://badgen.net/github/stars/RhinoSecurityLabs/ccat)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/ccat)[](https://badgen.net/github/watchers/RhinoSecurityLabs/ccat)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/ccat) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/ccat) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/ccat) |
95 | | **Dufflebag** | [https://github.com/bishopfox/dufflebag](https://github.com/bishopfox/dufflebag) | Search exposed EBS volumes for secrets | [](https://badgen.net/github/stars/bishopfox/dufflebag) | [](https://badgen.net/github/contributors/bishopfox/dufflebag) [](https://badgen.net/github/watchers/bishopfox/dufflebag) [](https://badgen.net/github/last-commit/bishopfox/dufflebag) [](https://badgen.net/github/open-issues/bishopfox/dufflebag) [](https://badgen.net/github/closed-issues/bishopfox/dufflebag) |
96 | | **attack_range** | [https://github.com/splunk/attack_range](https://github.com/splunk/attack_range) | A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk | [](https://badgen.net/github/stars/splunk/attack_range) | [](https://badgen.net/github/contributors/splunk/attack_range) [](https://badgen.net/github/watchers/splunk/attack_range) [](https://badgen.net/github/last-commit/splunk/attack_range) [](https://badgen.net/github/open-issues/splunk/attack_range) [](https://badgen.net/github/closed-issues/splunk/attack_range) |
97 | | **whispers** | [https://github.com/Skyscanner/whispers](https://github.com/Skyscanner/whispers) | Identify hardcoded secrets and dangerous behaviours | [](https://badgen.net/github/stars/Skyscanner/whispers) | [](https://badgen.net/github/contributors/Skyscanner/whispers) [](https://badgen.net/github/watchers/Skyscanner/whispers) [](https://badgen.net/github/last-commit/Skyscanner/whispers) [](https://badgen.net/github/open-issues/Skyscanner/whispers) [](https://badgen.net/github/closed-issues/Skyscanner/whispers) |
98 | | **Redboto** | [https://github.com/elitest/Redboto](https://github.com/elitest/Redboto) | Red Team AWS Scripts | [](https://badgen.net/github/stars/elitest/Redboto) | [](https://badgen.net/github/contributors/elitest/Redboto) [](https://badgen.net/github/watchers/elitest/Redboto) [](https://badgen.net/github/last-commit/elitest/Redboto) [](https://badgen.net/github/open-issues/elitest/Redboto) [](https://badgen.net/github/closed-issues/elitest/Redboto) |
99 | | **CloudBrute** | [https://github.com/0xsha/cloudbrute](https://github.com/0xsha/cloudbrute) | A tool to find a company (target) infrastructure, files, and apps on the top cloud providers | [](https://badgen.net/github/stars/0xsha/cloudbrute) | [](https://badgen.net/github/contributors/0xsha/cloudbrute) [](https://badgen.net/github/watchers/0xsha/cloudbrute) [](https://badgen.net/github/last-commit/0xsha/cloudbrute) [](https://badgen.net/github/open-issues/0xsha/cloudbrute) [](https://badgen.net/github/closed-issues/0xsha/cloudbrute) |
100 |
101 | ## Continuous Security Auditing
102 | | Name | URL | Description | Popularity | Metadata |
103 | | ---------- | :---------- | :---------- | :----------: | :----------: |
104 | | **Security Monkey** | [https://github.com/Netflix/security_monkey](https://github.com/Netflix/security_monkey) | |[](https://badgen.net/github/stars/Netflix/security_monkey)| [](https://badgen.net/github/contributors/Netflix/security_monkey)[](https://badgen.net/github/watchers/Netflix/security_monkey)[](https://badgen.net/github/last-commit/Netflix/security_monkey) [](https://badgen.net/github/open-issues/Netflix/security_monkey) [](https://badgen.net/github/closed-issues/Netflix/security_monkey) |
105 | | **Krampus** | [https://github.com/sendgrid/krampus](https://github.com/sendgrid/krampus) | |[](https://badgen.net/github/stars/sendgrid/krampus)| [](https://badgen.net/github/contributors/sendgrid/krampus)[](https://badgen.net/github/watchers/sendgrid/krampus)[](https://badgen.net/github/last-commit/sendgrid/krampus) [](https://badgen.net/github/open-issues/sendgrid/krampus) [](https://badgen.net/github/closed-issues/sendgrid/krampus) |
106 | | **Cloud Inquisitor** | [https://github.com/RiotGames/cloud-inquisitor](https://github.com/RiotGames/cloud-inquisitor) | |[](https://badgen.net/github/stars/RiotGames/cloud-inquisitor)| [](https://badgen.net/github/contributors/RiotGames/cloud-inquisitor)[](https://badgen.net/github/watchers/RiotGames/cloud-inquisitor)[](https://badgen.net/github/last-commit/RiotGames/cloud-inquisitor) [](https://badgen.net/github/open-issues/RiotGames/cloud-inquisitor) [](https://badgen.net/github/closed-issues/RiotGames/cloud-inquisitor) |
107 | | **CloudCustodian** | [https://github.com/cloud-custodian/cloud-custodian/](https://github.com/cloud-custodian/cloud-custodian/) | Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources |[](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) |
108 | | **Disable keys after X days** | [https://github.com/te-papa/aws-key-disabler](https://github.com/te-papa/aws-key-disabler) | |[](https://badgen.net/github/stars/te-papa/aws-key-disabler)| [](https://badgen.net/github/contributors/te-papa/aws-key-disabler)[](https://badgen.net/github/watchers/te-papa/aws-key-disabler)[](https://badgen.net/github/last-commit/te-papa/aws-key-disabler) [](https://badgen.net/github/open-issues/te-papa/aws-key-disabler) [](https://badgen.net/github/closed-issues/te-papa/aws-key-disabler) |
109 | | **Repokid Least Privilege** | [https://github.com/Netflix/repokid](https://github.com/Netflix/repokid) | |[](https://badgen.net/github/stars/Netflix/repokid)| [](https://badgen.net/github/contributors/Netflix/repokid)[](https://badgen.net/github/watchers/Netflix/repokid)[](https://badgen.net/github/last-commit/Netflix/repokid) [](https://badgen.net/github/open-issues/Netflix/repokid) [](https://badgen.net/github/closed-issues/Netflix/repokid) |
110 | | **Wazuh CloudTrail module** | [https://github.com/wazuh/wazuh](https://github.com/wazuh/wazuh) | |[](https://badgen.net/github/stars/wazuh/wazuh)| [](https://badgen.net/github/contributors/wazuh/wazuh)[](https://badgen.net/github/watchers/wazuh/wazuh)[](https://badgen.net/github/last-commit/wazuh/wazuh) [](https://badgen.net/github/open-issues/wazuh/wazuh) [](https://badgen.net/github/closed-issues/wazuh/wazuh) |
111 | | **Hammer** | [https://github.com/dowjones/hammer](https://github.com/dowjones/hammer) | |[](https://badgen.net/github/stars/dowjones/hammer)| [](https://badgen.net/github/contributors/dowjones/hammer)[](https://badgen.net/github/watchers/dowjones/hammer)[](https://badgen.net/github/last-commit/dowjones/hammer) [](https://badgen.net/github/open-issues/dowjones/hammer) [](https://badgen.net/github/closed-issues/dowjones/hammer) |
112 | | **Streamalert** | [https://github.com/airbnb/streamalert](https://github.com/airbnb/streamalert) | |[](https://badgen.net/github/stars/airbnb/streamalert)| [](https://badgen.net/github/contributors/airbnb/streamalert)[](https://badgen.net/github/watchers/airbnb/streamalert)[](https://badgen.net/github/last-commit/airbnb/streamalert) [](https://badgen.net/github/open-issues/airbnb/streamalert) [](https://badgen.net/github/closed-issues/airbnb/streamalert) |
113 | | **Billing Alerts CFN templates** | [https://github.com/btkrausen/AWS](https://github.com/btkrausen/AWS) | |[](https://badgen.net/github/stars/btkrausen/AWS)| [](https://badgen.net/github/contributors/btkrausen/AWS)[](https://badgen.net/github/watchers/btkrausen/AWS)[](https://badgen.net/github/last-commit/btkrausen/AWS) [](https://badgen.net/github/open-issues/btkrausen/AWS) [](https://badgen.net/github/closed-issues/btkrausen/AWS) |
114 | | **Watchmen** | [https://github.com/iagcl/watchmen](https://github.com/iagcl/watchmen) | AWS account compliance using centrally managed Config Rules |[](https://badgen.net/github/stars/iagcl/watchmen)| [](https://badgen.net/github/contributors/iagcl/watchmen)[](https://badgen.net/github/watchers/iagcl/watchmen)[](https://badgen.net/github/last-commit/iagcl/watchmen) [](https://badgen.net/github/open-issues/iagcl/watchmen) [](https://badgen.net/github/closed-issues/iagcl/watchmen) |
115 | | **ElectricEye** | [https://github.com/jonrau1/ElectricEye](https://github.com/jonrau1/ElectricEye) | Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability | [](https://badgen.net/github/stars/jonrau1/ElectricEye) | [](https://badgen.net/github/contributors/jonrau1/ElectricEye) [](https://badgen.net/github/watchers/jonrau1/ElectricEye) [](https://badgen.net/github/last-commit/jonrau1/ElectricEye) [](https://badgen.net/github/open-issues/jonrau1/ElectricEye) [](https://badgen.net/github/closed-issues/jonrau1/ElectricEye) |
116 | | **SyntheticSun** | [https://github.com/jonrau1/SyntheticSun](https://github.com/jonrau1/SyntheticSun) | a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats | [](https://badgen.net/github/stars/jonrau1/SyntheticSun) | [](https://badgen.net/github/contributors/jonrau1/SyntheticSun) [](https://badgen.net/github/watchers/jonrau1/SyntheticSun) [](https://badgen.net/github/last-commit/jonrau1/SyntheticSun) [](https://badgen.net/github/open-issues/jonrau1/SyntheticSun) [](https://badgen.net/github/closed-issues/jonrau1/SyntheticSun) |
117 | | **CloudQuery** | [https://github.com/cloudquery/cloudquery/](https://github.com/cloudquery/cloudquery/) | cloudquery exposes your cloud configuration and metadata as sql tables, providing powerful analysis and monitoring for compliance and security |[](https://badgen.net/github/stars/cloudquery/cloudquery/)| [](https://badgen.net/github/contributors/cloudquery/cloudquery/)[](https://badgen.net/github/watchers/cloudquery/cloudquery/)[](https://badgen.net/github/last-commit/cloudquery/cloudquery/) [](https://badgen.net/github/open-issues/cloudquery/cloudquery/) [](https://badgen.net/github/closed-issues/cloudquery/cloudquery/) |
118 | | **PrismX** | [https://github.com/omaidf/PrismX](https://github.com/omaidf/PrismX) | Cloud Security Dashboard for AWS - based on ScoutSuite | [](https://badgen.net/github/stars/omaidf/PrismX) | [](https://badgen.net/github/contributors/omaidf/PrismX) [](https://badgen.net/github/watchers/omaidf/PrismX) [](https://badgen.net/github/last-commit/omaidf/PrismX) [](https://badgen.net/github/open-issues/omaidf/PrismX) [](https://badgen.net/github/closed-issues/omaidf/PrismX) |
119 |
120 |
121 | ## Digital Forensics and Incident Response
122 | | Name | URL | Description | Popularity | Metadata |
123 | | ---------- | :---------- | :---------- | :----------: | :----------: |
124 | | **AWS IR** | [https://github.com/ThreatResponse/aws_ir](https://github.com/ThreatResponse/aws_ir) | AWS specific Incident Response and Forensics Tool |[](https://badgen.net/github/stars/ThreatResponse/aws_ir)| [](https://badgen.net/github/contributors/ThreatResponse/aws_ir)[](https://badgen.net/github/watchers/ThreatResponse/aws_ir)[](https://badgen.net/github/last-commit/ThreatResponse/aws_ir) [](https://badgen.net/github/open-issues/ThreatResponse/aws_ir) [](https://badgen.net/github/closed-issues/ThreatResponse/aws_ir) |
125 | | **Margaritashotgun** | [https://github.com/ThreatResponse/margaritashotgun](https://github.com/ThreatResponse/margaritashotgun) | Linux memory remote acquisition tool |[](https://badgen.net/github/stars/ThreatResponse/margaritashotgun)| [](https://badgen.net/github/contributors/ThreatResponse/margaritashotgun)[](https://badgen.net/github/watchers/ThreatResponse/margaritashotgun)[](https://badgen.net/github/last-commit/ThreatResponse/margaritashotgun) [](https://badgen.net/github/open-issues/ThreatResponse/margaritashotgun) [](https://badgen.net/github/closed-issues/ThreatResponse/margaritashotgun) |
126 | | **Diffy** | [https://github.com/Netflix-Skunkworks/diffy](https://github.com/Netflix-Skunkworks/diffy) | Triage tool used during cloud-centric security incidents |[](https://badgen.net/github/stars/Netflix-Skunkworks/diffy)| [](https://badgen.net/github/contributors/Netflix-Skunkworks/diffy)[](https://badgen.net/github/watchers/Netflix-Skunkworks/diffy)[](https://badgen.net/github/last-commit/Netflix-Skunkworks/diffy) [](https://badgen.net/github/open-issues/Netflix-Skunkworks/diffy) [](https://badgen.net/github/closed-issues/Netflix-Skunkworks/diffy) |
127 | | **AWS Security Automation** | [https://github.com/awslabs/aws-security-automation](https://github.com/awslabs/aws-security-automation) | AWS scripts and resources for DevSecOps and automated incident response |[](https://badgen.net/github/stars/awslabs/aws-security-automation)| [](https://badgen.net/github/contributors/awslabs/aws-security-automation)[](https://badgen.net/github/watchers/awslabs/aws-security-automation)[](https://badgen.net/github/last-commit/awslabs/aws-security-automation) [](https://badgen.net/github/open-issues/awslabs/aws-security-automation) [](https://badgen.net/github/closed-issues/awslabs/aws-security-automation) |
128 | | **GDPatrol** | [https://github.com/ansorren/GDPatrol](https://github.com/ansorren/GDPatrol) | Automated Incident Response based off AWS GuardDuty findings |[](https://badgen.net/github/stars/ansorren/GDPatrol)| [](https://badgen.net/github/contributors/ansorren/GDPatrol)[](https://badgen.net/github/watchers/ansorren/GDPatrol)[](https://badgen.net/github/last-commit/ansorren/GDPatrol) [](https://badgen.net/github/open-issues/ansorren/GDPatrol) [](https://badgen.net/github/closed-issues/ansorren/GDPatrol) |
129 | | **AWSlog** | [https://github.com/jaksi/awslog](https://github.com/jaksi/awslog) | Show the history and changes between configuration versions of AWS resources using AWS Config |[](https://badgen.net/github/stars/jaksi/awslog)| [](https://badgen.net/github/contributors/jaksi/awslog)[](https://badgen.net/github/watchers/jaksi/awslog)[](https://badgen.net/github/last-commit/jaksi/awslog) [](https://badgen.net/github/open-issues/jaksi/awslog) [](https://badgen.net/github/closed-issues/jaksi/awslog) |
130 | | **AWS_Responder** | [https://github.com/prolsen/aws_responder](https://github.com/prolsen/aws_responder) | AWS Digital Forensic and Incident Response (DFIR) Response Python Scripts |[](https://badgen.net/github/stars/prolsen/aws_responder)| [](https://badgen.net/github/contributors/prolsen/aws_responder)[](https://badgen.net/github/watchers/prolsen/aws_responder)[](https://badgen.net/github/last-commit/prolsen/aws_responder) [](https://badgen.net/github/open-issues/prolsen/aws_responder) [](https://badgen.net/github/closed-issues/prolsen/aws_responder) |
131 | | **SSM-Acquire** | [https://github.com/mozilla/ssm-acquire](https://github.com/mozilla/ssm-acquire) | A python module for orchestrating content acquisitions and analysis via Amazon SSM |[](https://badgen.net/github/stars/mozilla/ssm-acquire)| [](https://badgen.net/github/contributors/mozilla/ssm-acquire)[](https://badgen.net/github/watchers/mozilla/ssm-acquire)[](https://badgen.net/github/last-commit/mozilla/ssm-acquire) [](https://badgen.net/github/open-issues/mozilla/ssm-acquire) [](https://badgen.net/github/closed-issues/mozilla/ssm-acquire) |
132 | | **cloudtrail-partitioner** | [https://github.com/duo-labs/cloudtrail-partitioner](https://github.com/duo-labs/cloudtrail-partitioner) | This project sets up partitioned Athena tables for your CloudTrail logs and updates the partitions nightly. Makes CloudTrail logs queries easier. | [](https://badgen.net/github/stars/duo-labs/cloudtrail-partitioner)| [](https://badgen.net/github/contributors/duo-labs/cloudtrail-partitioner)[](https://badgen.net/github/watchers/duo-labs/cloudtrail-partitioner)[](https://badgen.net/github/last-commit/duo-labs/cloudtrail-partitioner) [](https://badgen.net/github/open-issues/duo-labs/cloudtrail-partitioner) [](https://badgen.net/github/closed-issues/duo-labs/cloudtrail-partitioner) |
133 | | **fargate-ir** | [https://github.com/andrewkrug/fargate-ir](https://github.com/andrewkrug/fargate-ir) | Proof of concept incident response demo using SSM and AWS Fargate. |[](https://badgen.net/github/stars/andrewkrug/fargate-ir)| [](https://badgen.net/github/contributors/andrewkrug/fargate-ir) [](https://badgen.net/github/watchers/andrewkrug/fargate-ir) [](https://badgen.net/github/last-commit/andrewkrug/fargate-ir) [](https://badgen.net/github/open-issues/andrewkrug/fargate-ir) [](https://badgen.net/github/closed-issues/andrewkrug/fargate-ir) |
134 | | **aws-logsearch** | [https://github.com/endgameinc/aws-logsearch](https://github.com/endgameinc/aws-logsearch) | Search AWS CloudWatch logs all at once on the command line. | [](https://badgen.net/github/stars/endgameinc/aws-logsearch) | [](https://badgen.net/github/contributors/endgameinc/aws-logsearch) [](https://badgen.net/github/watchers/endgameinc/aws-logsearch) [](https://badgen.net/github/last-commit/endgameinc/aws-logsearch) [](https://badgen.net/github/open-issues/endgameinc/aws-logsearch) [](https://badgen.net/github/closed-issues/endgameinc/aws-logsearch) |
135 | | **Varna** | [https://github.com/endgameinc/varna](https://github.com/endgameinc/varna) | Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL) | [](https://badgen.net/github/stars/endgameinc/varna) | [](https://badgen.net/github/contributors/endgameinc/varna) [](https://badgen.net/github/watchers/endgameinc/varna) [](https://badgen.net/github/last-commit/endgameinc/varna) [](https://badgen.net/github/open-issues/endgameinc/varna) [](https://badgen.net/github/closed-issues/endgameinc/varna) |
136 | | **aws-auto-remediate** | [https://github.com/servian/aws-auto-remediate](https://github.com/servian/aws-auto-remediate) | Open source application to instantly remediate common security issues through the use of AWS Config | [](https://badgen.net/github/stars/servian/aws-auto-remediate) | [](https://badgen.net/github/contributors/servian/aws-auto-remediate) [](https://badgen.net/github/watchers/servian/aws-auto-remediate) [](https://badgen.net/github/last-commit/servian/aws-auto-remediate) [](https://badgen.net/github/open-issues/servian/aws-auto-remediate) [](https://badgen.net/github/closed-issues/servian/aws-auto-remediate) |
137 | | **panther-labs** | [https://github.com/panther-labs/panther](https://github.com/panther-labs/panther) | Detect threats with log data and improve cloud security posture | [](https://badgen.net/github/stars/panther-labs/panther) | [](https://badgen.net/github/contributors/panther-labs/panther) [](https://badgen.net/github/watchers/panther-labs/panther) [](https://badgen.net/github/last-commit/panther-labs/panther) [](https://badgen.net/github/open-issues/panther-labs/panther) [](https://badgen.net/github/closed-issues/panther-labs/panther) |
138 | | **aws-incident-response** | [https://github.com/easttimor/aws-incident-response](https://github.com/easttimor/aws-incident-response) | This page is a collection of useful things to look for in CloudTrail using Athena for AWS incident response | [](https://badgen.net/github/stars/easttimor/aws-incident-response) | [](https://badgen.net/github/contributors/easttimor/aws-incident-response) [](https://badgen.net/github/watchers/easttimor/aws-incident-response) [](https://badgen.net/github/last-commit/easttimor/aws-incident-response) [](https://badgen.net/github/open-issues/easttimor/aws-incident-response) [](https://badgen.net/github/closed-issues/easttimor/aws-incident-response) |
139 | | **cloud-forensics-utils** | [https://github.com/google/cloud-forensics-utils](https://github.com/google/cloud-forensics-utils) | Python library to carry out DFIR analysis on the Cloud | [](https://badgen.net/github/stars/google/cloud-forensics-utils) | [](https://badgen.net/github/contributors/google/cloud-forensics-utils) [](https://badgen.net/github/watchers/google/cloud-forensics-utils) [](https://badgen.net/github/last-commit/google/cloud-forensics-utils) [](https://badgen.net/github/open-issues/google/cloud-forensics-utils) [](https://badgen.net/github/closed-issues/google/cloud-forensics-utils) |
140 | | **aws-fast-fixes** | [https://github.com/WarnerMedia/aws-fast-fixes](https://github.com/WarnerMedia/aws-fast-fixes) | Scripts to quickly fix security and compliance issues | [](https://badgen.net/github/stars/WarnerMedia/aws-fast-fixes) | [](https://badgen.net/github/contributors/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/watchers/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/last-commit/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/open-issues/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/closed-issues/WarnerMedia/aws-fast-fixes) |
141 |
142 |
143 | ## Development Security
144 | | Name | URL | Description | Popularity | Metadata |
145 | | ---------- | :---------- | :---------- | :----------: | :----------: |
146 | | **CFN NAG** | [https://github.com/stelligent/cfn_nag](https://github.com/stelligent/cfn_nag) | CloudFormation security test (Ruby) |[](https://badgen.net/github/stars/stelligent/cfn_nag)| [](https://badgen.net/github/contributors/stelligent/cfn_nag)[](https://badgen.net/github/watchers/stelligent/cfn_nag)[](https://badgen.net/github/last-commit/stelligent/cfn_nag) [](https://badgen.net/github/open-issues/stelligent/cfn_nag) [](https://badgen.net/github/closed-issues/stelligent/cfn_nag) |
147 | | **Git-secrets** | [https://github.com/awslabs/git-secrets](https://github.com/awslabs/git-secrets) | |[](https://badgen.net/github/stars/awslabs/git-secrets)| [](https://badgen.net/github/contributors/awslabs/git-secrets)[](https://badgen.net/github/watchers/awslabs/git-secrets)[](https://badgen.net/github/last-commit/awslabs/git-secrets) [](https://badgen.net/github/open-issues/awslabs/git-secrets) [](https://badgen.net/github/closed-issues/awslabs/git-secrets) |
148 | | **Repository of sample Custom Rules for AWS Config** | [https://github.com/awslabs/aws-config-rules](https://github.com/awslabs/aws-config-rules) | |[](https://badgen.net/github/stars/awslabs/aws-config-rules)| [](https://badgen.net/github/contributors/awslabs/aws-config-rules)[](https://badgen.net/github/watchers/awslabs/aws-config-rules)[](https://badgen.net/github/last-commit/awslabs/aws-config-rules) [](https://badgen.net/github/open-issues/awslabs/aws-config-rules) [](https://badgen.net/github/closed-issues/awslabs/aws-config-rules) |
149 | | **CFripper** | [https://github.com/Skyscanner/cfripper](https://github.com/Skyscanner/cfripper) | "Lambda function to ""rip apart"" a CloudFormation template and check it for security compliance." |[](https://badgen.net/github/stars/Skyscanner/cfripper)| [](https://badgen.net/github/contributors/Skyscanner/cfripper)[](https://badgen.net/github/watchers/Skyscanner/cfripper)[](https://badgen.net/github/last-commit/Skyscanner/cfripper) [](https://badgen.net/github/open-issues/Skyscanner/cfripper) [](https://badgen.net/github/closed-issues/Skyscanner/cfripper) |
150 | | **Assume** | [https://github.com/SanderKnape/assume](https://github.com/SanderKnape/assume) | A simple CLI utility that makes it easier to switch between different AWS roles |[](https://badgen.net/github/stars/SanderKnape/assume)| [](https://badgen.net/github/contributors/SanderKnape/assume)[](https://badgen.net/github/watchers/SanderKnape/assume)[](https://badgen.net/github/last-commit/SanderKnape/assume) [](https://badgen.net/github/open-issues/SanderKnape/assume) [](https://badgen.net/github/closed-issues/SanderKnape/assume) |
151 | | **Terrascan** | [https://github.com/cesar-rodriguez/terrascan](https://github.com/cesar-rodriguez/terrascan) | A collection of security and best practice tests for static code analysis of terraform templates using terraform_validate |[](https://badgen.net/github/stars/cesar-rodriguez/terrascan)| [](https://badgen.net/github/contributors/cesar-rodriguez/terrascan)[](https://badgen.net/github/watchers/cesar-rodriguez/terrascan)[](https://badgen.net/github/last-commit/cesar-rodriguez/terrascan) [](https://badgen.net/github/open-issues/cesar-rodriguez/terrascan) [](https://badgen.net/github/closed-issues/cesar-rodriguez/terrascan) |
152 | | **tfsec** | [https://github.com/liamg/tfsec](https://github.com/liamg/tfsec) | Provides static analysis of your terraform templates to spot potential security issues |[](https://badgen.net/github/stars/liamg/tfsec)| [](https://badgen.net/github/contributors/liamg/tfsec)[](https://badgen.net/github/watchers/liamg/tfsec)[](https://badgen.net/github/last-commit/liamg/tfsec) [](https://badgen.net/github/open-issues/liamg/tfsec) [](https://badgen.net/github/closed-issues/liamg/tfsec) |
153 | | **Checkov** | [https://github.com/bridgecrewio/checkov](https://github.com/bridgecrewio/checkov) | Terraform, Cloudformation and Kubernetes static analysis written in python |[](https://badgen.net/github/stars/bridgecrewio/checkov)| [](https://badgen.net/github/contributors/bridgecrewio/checkov)[](https://badgen.net/github/watchers/bridgecrewio/checkov)[](https://badgen.net/github/last-commit/bridgecrewio/checkov) [](https://badgen.net/github/open-issues/bridgecrewio/checkov) [](https://badgen.net/github/closed-issues/bridgecrewio/checkov) |
154 | | **Yor** | [https://github.com/bridgecrewio/yor](https://github.com/bridgecrewio/yor) | Automatically tag and trace infrastructure as code frameworks (Terraform, Cloudformation and Serverless) |[](https://badgen.net/github/stars/bridgecrewio/yor)| [](https://badgen.net/github/contributors/bridgecrewio/yor)[](https://badgen.net/github/watchers/bridgecrewio/yor)[](https://badgen.net/github/last-commit/bridgecrewio/yor) [](https://badgen.net/github/open-issues/bridgecrewio/yor) [](https://badgen.net/github/closed-issues/bridgecrewio/yor) |
155 | | **pytest-services** | [https://github.com/mozilla-services/pytest-services](https://github.com/mozilla-services/pytest-services) | Unit testing framework for test driven security of AWS configurations and more |[](https://badgen.net/github/stars/mozilla-services/pytest-services)| [](https://badgen.net/github/contributors/mozilla-services/pytest-services)[](https://badgen.net/github/watchers/mozilla-services/pytest-services)[](https://badgen.net/github/last-commit/mozilla-services/pytest-services) [](https://badgen.net/github/open-issues/mozilla-services/pytest-services) [](https://badgen.net/github/closed-issues/mozilla-services/pytest-services) |
156 | | **IAM Least-Privileged Role Generator** | [https://github.com/puresec/serverless-puresec-cli](https://github.com/puresec/serverless-puresec-cli) | A Serverless framework plugin that statically analyzes AWS Lambda function code and automagically generates least-privileged IAM roles. |[](https://badgen.net/github/stars/puresec/serverless-puresec-cli)| [](https://badgen.net/github/contributors/puresec/serverless-puresec-cli)[](https://badgen.net/github/watchers/puresec/serverless-puresec-cli)[](https://badgen.net/github/last-commit/puresec/serverless-puresec-cli) [](https://badgen.net/github/open-issues/puresec/serverless-puresec-cli) [](https://badgen.net/github/closed-issues/puresec/serverless-puresec-cli) |
157 | | **AWS Vault** | [https://github.com/99designs/aws-vault](https://github.com/99designs/aws-vault) | A vault for securely storing and accessing AWS credentials in development environments |[](https://badgen.net/github/stars/99designs/aws-vault)| [](https://badgen.net/github/contributors/99designs/aws-vault)[](https://badgen.net/github/watchers/99designs/aws-vault)[](https://badgen.net/github/last-commit/99designs/aws-vault) [](https://badgen.net/github/open-issues/99designs/aws-vault) [](https://badgen.net/github/closed-issues/99designs/aws-vault) |
158 | | **AWS Service Control Policies** | [https://github.com/jchrisfarris/aws-service-control-policies](https://github.com/jchrisfarris/aws-service-control-policies) | Collection of semi-useful Service Control Policies and scripts to manage them |[](https://badgen.net/github/stars/jchrisfarris/aws-service-control-policies)| [](https://badgen.net/github/contributors/jchrisfarris/aws-service-control-policies)[](https://badgen.net/github/watchers/jchrisfarris/aws-service-control-policies)[](https://badgen.net/github/last-commit/jchrisfarris/aws-service-control-policies) [](https://badgen.net/github/open-issues/jchrisfarris/aws-service-control-policies) [](https://badgen.net/github/closed-issues/jchrisfarris/aws-service-control-policies) |
159 | | **LambdaGuard** | [https://github.com/Skyscanner/LambdaGuard](https://github.com/Skyscanner/LambdaGuard) | AWS Lambda auditing tool that provides a meaningful overview in terms of statistical analysis AWS service dependencies and configuration checks from the security perspective |[](https://badgen.net/github/stars/Skyscanner/LambdaGuard)| [](https://badgen.net/github/contributors/Skyscanner/LambdaGuard)[](https://badgen.net/github/watchers/Skyscanner/LambdaGuard)[](https://badgen.net/github/last-commit/Skyscanner/LambdaGuard) [](https://badgen.net/github/open-issues/Skyscanner/LambdaGuard) [](https://badgen.net/github/closed-issues/Skyscanner/LambdaGuard) |
160 | | **Terraform-compliance** | [https://github.com/eerkunt/terraform-compliance](https://github.com/eerkunt/terraform-compliance) | A lightweight security focused BDD test framework against terraform (with helpful code for AWS) |[](https://badgen.net/github/stars/eerkunt/terraform-compliance)| [](https://badgen.net/github/contributors/eerkunt/terraform-compliance)[](https://badgen.net/github/watchers/eerkunt/terraform-compliance)[](https://badgen.net/github/last-commit/eerkunt/terraform-compliance) [](https://badgen.net/github/open-issues/eerkunt/terraform-compliance) [](https://badgen.net/github/closed-issues/eerkunt/terraform-compliance) |
161 | | **Get a List of AWS Managed Policies** | [https://github.com/RyPeck/aws_managed_policies](https://github.com/RyPeck/aws_managed_policies) | a way to get a list of all AWS managed policies |[](https://badgen.net/github/stars/RyPeck/aws_managed_policies)| [](https://badgen.net/github/contributors/RyPeck/aws_managed_policies)[](https://badgen.net/github/watchers/RyPeck/aws_managed_policies)[](https://badgen.net/github/last-commit/RyPeck/aws_managed_policies) [](https://badgen.net/github/open-issues/RyPeck/aws_managed_policies) [](https://badgen.net/github/closed-issues/RyPeck/aws_managed_policies) |
162 | | **Parliament** | [https://github.com/duo-labs/parliament](https://github.com/duo-labs/parliament) | AWS IAM linting library |[](https://badgen.net/github/stars/duo-labs/parliament)| [](https://badgen.net/github/contributors/duo-labs/parliament)[](https://badgen.net/github/watchers/duo-labs/parliament) [](https://badgen.net/github/last-commit/duo-labs/parliament) [](https://badgen.net/github/open-issues/duo-labs/parliament) [](https://badgen.net/github/closed-issues/duo-labs/parliament) |
163 | | **AWS-ComplianceMachineDontStop** | [https://github.com/jonrau1/AWS-ComplianceMachineDontStop](https://github.com/jonrau1/AWS-ComplianceMachineDontStop) | Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security Identity & Compliance Services to Support your AWS Account Security Posture |[](https://badgen.net/github/stars/jonrau1/AWS-ComplianceMachineDontStop)| [](https://badgen.net/github/contributors/jonrau1/AWS-ComplianceMachineDontStop)[](https://badgen.net/github/watchers/jonrau1/AWS-ComplianceMachineDontStop)[](https://badgen.net/github/last-commit/jonrau1/AWS-ComplianceMachineDontStop) [](https://badgen.net/github/open-issues/jonrau1/AWS-ComplianceMachineDontStop) [](https://badgen.net/github/closed-issues/jonrau1/AWS-ComplianceMachineDontStop) |
164 | | **detect-secrets** | [https://github.com/Yelp/detect-secrets](https://github.com/Yelp/detect-secrets) | An enterprise friendly way of detecting and preventing secrets in code. |[](https://badgen.net/github/stars/yelp/detect-secrets)| [](https://badgen.net/github/contributors/yelp/detect-secrets)[](https://badgen.net/github/watchers/yelp/detect-secrets)[](https://badgen.net/github/last-commit/yelp/detect-secrets) [](https://badgen.net/github/open-issues/yelp/detect-secrets) [](https://badgen.net/github/closed-issues/yelp/detect-secrets) |
165 | | **tf-parliament** | [https://github.com/rdkls/tf-parliament](https://github.com/rdkls/tf-parliament) | Run Parliament AWS IAM Checker on Terraform Files |[](https://badgen.net/github/stars/rdkls/tf-parliament)| [](https://badgen.net/github/contributors/rdkls/tf-parliament) [](https://badgen.net/github/watchers/rdkls/tf-parliament) [](https://badgen.net/github/last-commit/rdkls/tf-parliament) [](https://badgen.net/github/open-issues/rdkls/tf-parliament) [](https://badgen.net/github/closed-issues/rdkls/tf-parliament) |
166 | | **aws-gate** | [https://github.com/xen0l/aws-gate](https://github.com/xen0l/aws-gate) | Better AWS SSM Session manager CLI client | [](https://badgen.net/github/stars/xen0l/aws-gate)| [](https://badgen.net/github/contributors/xen0l/aws-gate) [](https://badgen.net/github/watchers/xen0l/aws-gate) [](https://badgen.net/github/last-commit/xen0l/aws-gate) [](https://badgen.net/github/open-issues/xen0l/aws-gate) [](https://badgen.net/github/closed-issues/xen0l/aws-gate) |
167 | | **iam-lint** | [https://github.com/xen0l/iam-lint](https://github.com/xen0l/iam-lint) | Github action for linting AWS IAM policy documents for correctness and possible security issues |[](https://badgen.net/github/stars/xen0l/iam-lint) | [](https://badgen.net/github/contributors/xen0l/iam-lint) [](https://badgen.net/github/watchers/xen0l/iam-lint) [](https://badgen.net/github/last-commit/xen0l/iam-lint) [](https://badgen.net/github/open-issues/xen0l/iam-lint) [](https://badgen.net/github/closed-issues/xen0l/iam-lint) |
168 | | **Regula** | [https://github.com/fugue/regula](https://github.com/fugue/regula) | Regula checks Terraform for AWS security and compliance using Open Policy Agent/Rego | [](https://badgen.net/github/stars/fugue/regula) | [](https://badgen.net/github/contributors/fugue/regula) [](https://badgen.net/github/watchers/fugue/regula) [](https://badgen.net/github/last-commit/fugue/regula) [](https://badgen.net/github/open-issues/fugue/regula) [](https://badgen.net/github/closed-issues/fugue/regula) |
169 | | **whispers** | [https://github.com/Skyscanner/whispers](https://github.com/Skyscanner/whispers) | Identify hardcoded secrets and dangerous behaviours | [](https://badgen.net/github/stars/Skyscanner/whispers) | [](https://badgen.net/github/contributors/Skyscanner/whispers) [](https://badgen.net/github/watchers/Skyscanner/whispers) [](https://badgen.net/github/last-commit/Skyscanner/whispers) [](https://badgen.net/github/open-issues/Skyscanner/whispers) [](https://badgen.net/github/closed-issues/Skyscanner/whispers) |
170 | | **cloudformation-guard** | [https://github.com/aws-cloudformation/cloudformation-guard](https://github.com/aws-cloudformation/cloudformation-guard) | A set of tools to check AWS CloudFormation templates for policy compliance using a simple, policy-as-code, declarative syntax. | [](https://badgen.net/github/stars/aws-cloudformation/cloudformation-guard) | [](https://badgen.net/github/contributors/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/watchers/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/last-commit/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/open-issues/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/closed-issues/aws-cloudformation/cloudformation-guard) |
171 | | **IAMFinder** | [https://github.com/prisma-cloud/IAMFinder](https://github.com/prisma-cloud/IAMFinder) | Enumerates and finds users and IAM roles in a target AWS account | [](https://badgen.net/github/stars/prisma-cloud/IAMFinder)| [](https://badgen.net/github/contributors/prisma-cloud/IAMFinder) [](https://badgen.net/github/watchers/prisma-cloud/IAMFinder) [](https://badgen.net/github/last-commit/prisma-cloud/IAMFinder) [](https://badgen.net/github/open-issues/prisma-cloud/IAMFinder) [](https://badgen.net/github/closed-issues/prisma-cloud/IAMFinder) |
172 | | **iamlive** | [https://github.com/iann0036/iamlive](https://github.com/iann0036/iamlive) | Generate a basic IAM policy from AWS client-side monitoring (CSM) | [](https://badgen.net/github/stars/iann0036/iamlive) | [](https://badgen.net/github/contributors/iann0036/iamlive) [](https://badgen.net/github/watchers/iann0036/iamlive) [](https://badgen.net/github/last-commit/iann0036/iamlive) [](https://badgen.net/github/open-issues/iann0036/iamlive) [](https://badgen.net/github/closed-issues/iann0036/iamlive) |
173 | | **aws-allowlister** | [https://github.com/salesforce/aws-allowlister](https://github.com/salesforce/aws-allowlister) | Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks. | [](https://badgen.net/github/stars/salesforce/aws-allowlister) | [](https://badgen.net/github/contributors/salesforce/aws-allowlister) [](https://badgen.net/github/watchers/salesforce/aws-allowlister) [](https://badgen.net/github/last-commit/salesforce/aws-allowlister) [](https://badgen.net/github/open-issues/salesforce/aws-allowlister) [](https://badgen.net/github/closed-issues/salesforce/aws-allowlister) |
174 | | **Leapp** | [https://github.com/Noovolari/leapp](https://github.com/Noovolari/leapp) | Cross-platform app for managing AWS credentials programmatically, based on Electron |[](https://badgen.net/github/stars/Noovolari/leapp)| [](https://badgen.net/github/contributors/Noovolari/leapp)[](https://badgen.net/github/watchers/Noovolari/leapp)[](https://badgen.net/github/last-commit/Noovolari/leapp) [](https://badgen.net/github/open-issues/Noovolari/leapp) [](https://badgen.net/github/closed-issues/Noovolari/leapp) |
175 | | **KICS** | [https://github.com/Checkmarx/kics](https://github.com/Checkmarx/kics) | Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code |[](https://badgen.net/github/stars/Checkmarx/kics)| [](https://badgen.net/github/contributors/Checkmarx/kics)[](https://badgen.net/github/watchers/Checkmarx/kics)[](https://badgen.net/github/last-commit/Checkmarx/kics) [](https://badgen.net/github/open-issues/Checkmarx/kics) [](https://badgen.net/github/closed-issues/Checkmarx/kics) |
176 | | **SecurityHub CIS Compliance Automator** | [https://github.com/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation](https://github.com/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) | Automatically configure your AWS Account to meet 95% of the 200+ controls for CIS Compliance, PCI DSS Compliance and AWS Security Best Practice |[](https://badgen.net/github/stars/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)| [](https://badgen.net/github/contributors/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)[](https://badgen.net/github/watchers/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)[](https://badgen.net/github/last-commit/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) [](https://badgen.net/github/open-issues/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) [](https://badgen.net/github/closed-issues/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) |
177 |
178 | ## S3 Buckets Auditing
179 | | Name | URL | Description | Popularity | Metadata |
180 | | ---------- | :---------- | :---------- | :----------: | :----------: |
181 | | **sandcastle** | [https://github.com/Parasimpaticki/sandcastle](https://github.com/Parasimpaticki/sandcastle) | S3 bucket enumeration | [](https://badgen.net/github/stars/Parasimpaticki/sandcastle)| [](https://badgen.net/github/contributors/Parasimpaticki/sandcastle)[](https://badgen.net/github/watchers/Parasimpaticki/sandcastle)[](https://badgen.net/github/last-commit/Parasimpaticki/sandcastle) [](https://badgen.net/github/open-issues/Parasimpaticki/sandcastle) [](https://badgen.net/github/closed-issues/Parasimpaticki/sandcastle) |
182 | | **mass3** | [https://github.com/smiegles/mass3](https://github.com/smiegles/mass3) | enumerate through a pre-compiled list of AWS S3 buckets using DNS instead of HTTP with a list of DNS resolvers and multi-threading |[](https://badgen.net/github/stars/smiegles/mass3)| [](https://badgen.net/github/contributors/smiegles/mass3)[](https://badgen.net/github/watchers/smiegles/mass3)[](https://badgen.net/github/last-commit/smiegles/mass3) [](https://badgen.net/github/open-issues/smiegles/mass3) [](https://badgen.net/github/closed-issues/smiegles/mass3) |
183 | | **s3enum** | [https://github.com/koenrh/s3enum](https://github.com/koenrh/s3enum) | S3 bucket enumeration |[](https://badgen.net/github/stars/koenrh/s3enum)| [](https://badgen.net/github/contributors/koenrh/s3enum)[](https://badgen.net/github/watchers/koenrh/s3enum)[](https://badgen.net/github/last-commit/koenrh/s3enum) [](https://badgen.net/github/open-issues/koenrh/s3enum) [](https://badgen.net/github/closed-issues/koenrh/s3enum) |
184 | | **teh_s3_bucketeers** | [https://github.com/tomdev/teh_s3_bucketeers](https://github.com/tomdev/teh_s3_bucketeers) | |[](https://badgen.net/github/stars/tomdev/teh_s3_bucketeers)| [](https://badgen.net/github/contributors/tomdev/teh_s3_bucketeers)[](https://badgen.net/github/watchers/tomdev/teh_s3_bucketeers)[](https://badgen.net/github/last-commit/tomdev/teh_s3_bucketeers) [](https://badgen.net/github/open-issues/tomdev/teh_s3_bucketeers) [](https://badgen.net/github/closed-issues/tomdev/teh_s3_bucketeers) |
185 | | **bucket-stream** | [https://github.com/eth0izzle/bucket-stream](https://github.com/eth0izzle/bucket-stream) | Find interesting Amazon S3 Buckets by watching certificate transparency logs |[](https://badgen.net/github/stars/eth0izzle/bucket-stream)| [](https://badgen.net/github/contributors/eth0izzle/bucket-stream)[](https://badgen.net/github/watchers/eth0izzle/bucket-stream)[](https://badgen.net/github/last-commit/eth0izzle/bucket-stream) [](https://badgen.net/github/open-issues/eth0izzle/bucket-stream) [](https://badgen.net/github/closed-issues/eth0izzle/bucket-stream) |
186 | | **s3-buckets-finder** | [https://github.com/gwen001/s3-buckets-finder](https://github.com/gwen001/s3-buckets-finder) | brute force Amazon S3 bucket |[](https://badgen.net/github/stars/gwen001/s3-buckets-finder)| [](https://badgen.net/github/contributors/gwen001/s3-buckets-finder)[](https://badgen.net/github/watchers/gwen001/s3-buckets-finder)[](https://badgen.net/github/last-commit/gwen001/s3-buckets-finder) [](https://badgen.net/github/open-issues/gwen001/s3-buckets-finder) [](https://badgen.net/github/closed-issues/gwen001/s3-buckets-finder) |
187 | | **s3find** | [https://github.com/aaparmeggiani/s3find](https://github.com/aaparmeggiani/s3find) | find S3 public buckets |[](https://badgen.net/github/stars/aaparmeggiani/s3find)| [](https://badgen.net/github/contributors/aaparmeggiani/s3find)[](https://badgen.net/github/watchers/aaparmeggiani/s3find)[](https://badgen.net/github/last-commit/aaparmeggiani/s3find) [](https://badgen.net/github/open-issues/aaparmeggiani/s3find) [](https://badgen.net/github/closed-issues/aaparmeggiani/s3find) |
188 | | **slurp-robbie** | [https://github.com/random-robbie/slurp](https://github.com/random-robbie/slurp) | Enumerate S3 buckets via certstream, domain, or keywords |[](https://badgen.net/github/stars/random-robbie/slurp)| [](https://badgen.net/github/contributors/random-robbie/slurp)[](https://badgen.net/github/watchers/random-robbie/slurp)[](https://badgen.net/github/last-commit/random-robbie/slurp) [](https://badgen.net/github/open-issues/random-robbie/slurp) [](https://badgen.net/github/closed-issues/random-robbie/slurp) |
189 | | **s3-inspector** | [https://github.com/clario-tech/s3-inspector](https://github.com/clario-tech/s3-inspector) | check AWS S3 bucket permissions |[](https://badgen.net/github/stars/clario-tech/s3-inspector)| [](https://badgen.net/github/contributors/clario-tech/s3-inspector)[](https://badgen.net/github/watchers/clario-tech/s3-inspector)[](https://badgen.net/github/last-commit/clario-tech/s3-inspector) [](https://badgen.net/github/open-issues/clario-tech/s3-inspector) [](https://badgen.net/github/closed-issues/clario-tech/s3-inspector) |
190 | | **s3-fuzzer** | [https://github.com/pbnj/s3-fuzzer](https://github.com/pbnj/s3-fuzzer) | |[](https://badgen.net/github/stars/pbnj/s3-fuzzer)| [](https://badgen.net/github/contributors/pbnj/s3-fuzzer)[](https://badgen.net/github/watchers/pbnj/s3-fuzzer)[](https://badgen.net/github/last-commit/pbnj/s3-fuzzer) [](https://badgen.net/github/open-issues/pbnj/s3-fuzzer) [](https://badgen.net/github/closed-issues/pbnj/s3-fuzzer) |
191 | | **AWSBucketDump** | [https://github.com/jordanpotti/AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Look For Interesting Files in S3 Buckets |[](https://badgen.net/github/stars/jordanpotti/AWSBucketDump)| [](https://badgen.net/github/contributors/jordanpotti/AWSBucketDump)[](https://badgen.net/github/watchers/jordanpotti/AWSBucketDump)[](https://badgen.net/github/last-commit/jordanpotti/AWSBucketDump) [](https://badgen.net/github/open-issues/jordanpotti/AWSBucketDump) [](https://badgen.net/github/closed-issues/jordanpotti/AWSBucketDump) |
192 | | **s3scan** | [https://github.com/bear/s3scan](https://github.com/bear/s3scan) | scan s3 buckets for security issues |[](https://badgen.net/github/stars/bear/s3scan)| [](https://badgen.net/github/contributors/bear/s3scan)[](https://badgen.net/github/watchers/bear/s3scan)[](https://badgen.net/github/last-commit/bear/s3scan) [](https://badgen.net/github/open-issues/bear/s3scan) [](https://badgen.net/github/closed-issues/bear/s3scan) |
193 | | **S3Scanner** | [https://github.com/sa7mon/S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents |[](https://badgen.net/github/stars/sa7mon/S3Scanner)| [](https://badgen.net/github/contributors/sa7mon/S3Scanner)[](https://badgen.net/github/watchers/sa7mon/S3Scanner)[](https://badgen.net/github/last-commit/sa7mon/S3Scanner) [](https://badgen.net/github/open-issues/sa7mon/S3Scanner) [](https://badgen.net/github/closed-issues/sa7mon/S3Scanner) |
194 | | **s3finder** | [https://github.com/magisterquis/s3finder](https://github.com/magisterquis/s3finder) | open S3 bucket finder |[](https://badgen.net/github/stars/magisterquis/s3finder)| [](https://badgen.net/github/contributors/magisterquis/s3finder)[](https://badgen.net/github/watchers/magisterquis/s3finder)[](https://badgen.net/github/last-commit/magisterquis/s3finder) [](https://badgen.net/github/open-issues/magisterquis/s3finder) [](https://badgen.net/github/closed-issues/magisterquis/s3finder) |
195 | | **S3Scan** | [https://github.com/abhn/S3Scan](https://github.com/abhn/S3Scan) | spider a website and find publicly open S3 buckets |[](https://badgen.net/github/stars/abhn/S3Scan)| [](https://badgen.net/github/contributors/abhn/S3Scan)[](https://badgen.net/github/watchers/abhn/S3Scan)[](https://badgen.net/github/last-commit/abhn/S3Scan) [](https://badgen.net/github/open-issues/abhn/S3Scan) [](https://badgen.net/github/closed-issues/abhn/S3Scan) |
196 | | **s3-meta** | [https://github.com/whitfin/s3-meta](https://github.com/whitfin/s3-meta) | Gather metadata about your S3 buckets |[](https://badgen.net/github/stars/whitfin/s3-meta)| [](https://badgen.net/github/contributors/whitfin/s3-meta)[](https://badgen.net/github/watchers/whitfin/s3-meta)[](https://badgen.net/github/last-commit/whitfin/s3-meta) [](https://badgen.net/github/open-issues/whitfin/s3-meta) [](https://badgen.net/github/closed-issues/whitfin/s3-meta) |
197 | | **s3-utils** | [https://github.com/whitfin/s3-utils](https://github.com/whitfin/s3-utils) | Utilities and tools based around Amazon S3 to provide convenience APIs in a CLI |[](https://badgen.net/github/stars/whitfin/s3-utils)| [](https://badgen.net/github/contributors/whitfin/s3-utils)[](https://badgen.net/github/watchers/whitfin/s3-utils)[](https://badgen.net/github/last-commit/whitfin/s3-utils) [](https://badgen.net/github/open-issues/whitfin/s3-utils) [](https://badgen.net/github/closed-issues/whitfin/s3-utils) |
198 | | **S3PublicBucketsCheck** | [https://github.com/vr00n/Amazon-Web-Shenanigans](https://github.com/vr00n/Amazon-Web-Shenanigans) | A lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is created |[](https://badgen.net/github/stars/vr00n/Amazon-Web-Shenanigans)| [](https://badgen.net/github/contributors/vr00n/Amazon-Web-Shenanigans)[](https://badgen.net/github/watchers/vr00n/Amazon-Web-Shenanigans)[](https://badgen.net/github/last-commit/vr00n/Amazon-Web-Shenanigans) [](https://badgen.net/github/open-issues/vr00n/Amazon-Web-Shenanigans) [](https://badgen.net/github/closed-issues/vr00n/Amazon-Web-Shenanigans) |
199 | | **bucket_finder** | [https://github.com/FishermansEnemy/bucket_finder](https://github.com/FishermansEnemy/bucket_finder) | Amazon bucket brute force tool |[](https://badgen.net/github/stars/FishermansEnemy/bucket_finder)| [](https://badgen.net/github/contributors/FishermansEnemy/bucket_finder)[](https://badgen.net/github/watchers/FishermansEnemy/bucket_finder)[](https://badgen.net/github/last-commit/FishermansEnemy/bucket_finder) [](https://badgen.net/github/open-issues/FishermansEnemy/bucket_finder) [](https://badgen.net/github/closed-issues/FishermansEnemy/bucket_finder) |
200 | | **inSp3ctor** | [https://github.com/brianwarehime/inSp3ctor](https://github.com/brianwarehime/inSp3ctor) | AWS S3 Bucket/Object Finder |[](https://badgen.net/github/stars/brianwarehime/inSp3ctor)| [](https://badgen.net/github/contributors/brianwarehime/inSp3ctor)[](https://badgen.net/github/watchers/brianwarehime/inSp3ctor)[](https://badgen.net/github/last-commit/brianwarehime/inSp3ctor) [](https://badgen.net/github/open-issues/brianwarehime/inSp3ctor) [](https://badgen.net/github/closed-issues/brianwarehime/inSp3ctor) |
201 | | **bucketcat** | [https://github.com/Atticuss/bucketcat](https://github.com/Atticuss/bucketcat) | Brute-forces objects within a given bucket using Hashcat mask-like syntax |[](https://badgen.net/github/stars/Atticuss/bucketcat)| [](https://badgen.net/github/contributors/Atticuss/bucketcat)[](https://badgen.net/github/watchers/Atticuss/bucketcat)[](https://badgen.net/github/last-commit/Atticuss/bucketcat) [](https://badgen.net/github/open-issues/Atticuss/bucketcat) [](https://badgen.net/github/closed-issues/Atticuss/bucketcat) |
202 | | **aws-s3-data-finder** | [https://github.com/Ucnt/aws-s3-data-finder](https://github.com/Ucnt/aws-s3-data-finder) | AWS S3 Sensitive Data Search |[](https://badgen.net/github/stars/Ucnt/aws-s3-data-finder)| [](https://badgen.net/github/contributors/Ucnt/aws-s3-data-finder)[](https://badgen.net/github/watchers/Ucnt/aws-s3-data-finder)[](https://badgen.net/github/last-commit/Ucnt/aws-s3-data-finder) [](https://badgen.net/github/open-issues/Ucnt/aws-s3-data-finder) [](https://badgen.net/github/closed-issues/Ucnt/aws-s3-data-finder) |
203 | | **lazys3** | [https://github.com/nahamsec/lazys3](https://github.com/nahamsec/lazys3) | bruteforce AWS s3 buckets using different permutations |[](https://badgen.net/github/stars/nahamsec/lazys3)| [](https://badgen.net/github/contributors/nahamsec/lazys3)[](https://badgen.net/github/watchers/nahamsec/lazys3)[](https://badgen.net/github/last-commit/nahamsec/lazys3) [](https://badgen.net/github/open-issues/nahamsec/lazys3) [](https://badgen.net/github/closed-issues/nahamsec/lazys3) |
204 | | **BucketScanner** | [https://github.com/securing/BucketScanner](https://github.com/securing/BucketScanner) | Test objects' permissions in AWS buckets |[](https://badgen.net/github/stars/securing/BucketScanner)| [](https://badgen.net/github/contributors/securing/BucketScanner)[](https://badgen.net/github/watchers/securing/BucketScanner)[](https://badgen.net/github/last-commit/securing/BucketScanner) [](https://badgen.net/github/open-issues/securing/BucketScanner) [](https://badgen.net/github/closed-issues/securing/BucketScanner) |
205 | | **aws-externder-cli** | [https://github.com/VirtueSecurity/aws-extender-cli](https://github.com/VirtueSecurity/aws-extender-cli) | Test S3 buckets as well as Google Storage buckets and Azure Storage containers to find interesting files |[](https://badgen.net/github/stars/VirtueSecurity/aws-extender-cli)| [](https://badgen.net/github/contributors/VirtueSecurity/aws-extender-cli)[](https://badgen.net/github/watchers/VirtueSecurity/aws-extender-cli)[](https://badgen.net/github/last-commit/VirtueSecurity/aws-extender-cli) [](https://badgen.net/github/open-issues/VirtueSecurity/aws-extender-cli) [](https://badgen.net/github/closed-issues/VirtueSecurity/aws-extender-cli) |
206 | | **festin** | [https://github.com/cr0hn/festin](https://github.com/cr0hn/festin) | S3 bucket weakness discovery | [](https://badgen.net/github/stars/cr0hn/festin) | [](https://badgen.net/github/contributors/cr0hn/festin) [](https://badgen.net/github/watchers/cr0hn/festin) [](https://badgen.net/github/last-commit/cr0hn/festin) [](https://badgen.net/github/open-issues/cr0hn/festin) [](https://badgen.net/github/closed-issues/cr0hn/festin) |
207 | | **S3Insights** | [https://github.com/kurmiashish/S3Insights](https://github.com/kurmiashish/S3Insights) | a platform for efficiently deriving security insights about S3 data through metadata analysis | [](https://badgen.net/github/stars/kurmiashish/S3Insights) | [](https://badgen.net/github/contributors/kurmiashish/S3Insights) [](https://badgen.net/github/watchers/kurmiashish/S3Insights) [](https://badgen.net/github/last-commit/kurmiashish/S3Insights) [](https://badgen.net/github/open-issues/kurmiashish/S3Insights) [](https://badgen.net/github/closed-issues/kurmiashish/S3Insights) |
208 | | **s3_objects_check** | [https://github.com/nccgroup/s3_objects_check](https://github.com/nccgroup/s3_objects_check) | Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files. | [](https://badgen.net/github/stars/nccgroup/s3_objects_check) | [](https://badgen.net/github/contributors/nccgroup/s3_objects_check) [](https://badgen.net/github/watchers/nccgroup/s3_objects_check) [](https://badgen.net/github/last-commit/nccgroup/s3_objects_check) [](https://badgen.net/github/open-issues/nccgroup/s3_objects_check) [](https://badgen.net/github/closed-issues/nccgroup/s3_objects_check) |
209 |
210 | ## Training
211 | | Name | URL | Description | Popularity | Metadata |
212 | | ---------- | :---------- | :---------- | :----------: | :----------: |
213 | | **Flaws.cloud** | [http://flaws.cloud/](http://flaws.cloud/) | flAWS challenge to learn through a series of levels about common mistakes and gotchas when using AWS | | | | | |
214 | | **Flaws2.cloud** | [http://flaws2.cloud/](http://flaws2.cloud/) | flAWS 2 has two paths this time Attacker and Defender! In the Attacker path you'll exploit your way through misconfigurations in serverless (Lambda) and containers (ECS Fargate). In the Defender path that target is now viewed as the victim and you'll work as an incident responder for that same app understanding how an attack happened | | | | | |
215 | | **CloudGoat** | [https://github.com/RhinoSecurityLabs/cloudgoat](https://github.com/RhinoSecurityLabs/cloudgoat) | Vulnerable by Design AWS infrastructure setup tool |[](https://badgen.net/github/stars/RhinoSecurityLabs/cloudgoat)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/watchers/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/cloudgoat) |
216 | | **dvca** | [https://github.com/m6a-UdS/dvca](https://github.com/m6a-UdS/dvca) | Damn Vulnerable Cloud Application [more info](https://medium.com/poka-techblog/privilege-escalation-in-the-cloud-from-ssrf-to-global-account-administrator-fd943cf5a2f6) |[](https://badgen.net/github/stars/m6a-UdS/dvca)| [](https://badgen.net/github/contributors/m6a-UdS/dvca)[](https://badgen.net/github/watchers/m6a-UdS/dvca)[](https://badgen.net/github/last-commit/m6a-UdS/dvca) [](https://badgen.net/github/open-issues/m6a-UdS/dvca) [](https://badgen.net/github/closed-issues/m6a-UdS/dvca) |
217 | | **AWSDetonationLab** | [https://github.com/sonofagl1tch/AWSDetonationLab](https://github.com/sonofagl1tch/AWSDetonationLab) | Scripts and templates to generate some basic detections of the AWS security services |[](https://badgen.net/github/stars/sonofagl1tch/AWSDetonationLab)| [](https://badgen.net/github/contributors/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/watchers/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/last-commit/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/open-issues/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/closed-issues/sonofagl1tch/AWSDetonationLab) |
218 | | **OWASPServerlessGoat** | [https://github.com/OWASP/Serverless-Goat](https://github.com/OWASP/Serverless-Goat) | OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application maintained by OWASP for educational purposes. Single click installation through the AWS Serverless Application Repository. |[](https://badgen.net/github/stars/OWASP/Serverless-Goat)| [](https://badgen.net/github/contributors/OWASP/Serverless-Goat)[](https://badgen.net/github/watchers/OWASP/Serverless-Goat)[](https://badgen.net/github/last-commit/OWASP/Serverless-Goat) [](https://badgen.net/github/open-issues/OWASP/Serverless-Goat) [](https://badgen.net/github/closed-issues/OWASP/Serverless-Goat) |
219 | | **Sadcloud** | [https://github.com/nccgroup/sadcloud](https://github.com/nccgroup/sadcloud) | A tool for spinning up insecure AWS infrastructure with Terraform. It supports approx. 84 misconfigurations across 22 AWS Services.|[](https://badgen.net/github/stars/nccgroup/sadcloud)| [](https://badgen.net/github/contributors/nccgroup/sadcloud)[](https://badgen.net/github/watchers/nccgroup/sadcloud)[](https://badgen.net/github/last-commit/nccgroup/sadcloud) [](https://badgen.net/github/open-issues/nccgroup/sadcloud) [](https://badgen.net/github/closed-issues/nccgroup/sadcloud) |
220 | | **BigOrange Actions** | [https://bigorange.cloud/actions/](https://bigorange.cloud/actions/) | Paste your IAM Policy and get a list of Actions it can effectively perform | | | | | |
221 | | **IncidentResponseGenerator** | [https://github.com/disruptops/IncidentResponseGenerator](https://github.com/disruptops/IncidentResponseGenerator) | Incident response generator for training classes |[](https://badgen.net/github/stars/disruptops/IncidentResponseGenerator)| [](https://badgen.net/github/contributors/disruptops/IncidentResponseGenerator)[](https://badgen.net/github/watchers/disruptops/IncidentResponseGenerator)[](https://badgen.net/github/last-commit/disruptops/IncidentResponseGenerator) [](https://badgen.net/github/open-issues/disruptops/IncidentResponseGenerator) [](https://badgen.net/github/closed-issues/disruptops/IncidentResponseGenerator) |
222 | | **Leonidas** | [https://github.com/fsecurelabs/leonidas](https://github.com/fsecurelabs/leonidas) | Automated Attack Simulation in the Cloud complete with detection use cases. | [](https://badgen.net/github/stars/fsecurelabs/leonidas) | [](https://badgen.net/github/contributors/fsecurelabs/leonidas) [](https://badgen.net/github/watchers/fsecurelabs/leonidas) [](https://badgen.net/github/last-commit/fsecurelabs/leonidas) [](https://badgen.net/github/open-issues/fsecurelabs/leonidas) [](https://badgen.net/github/closed-issues/fsecurelabs/leonidas) |
223 | | **Breaking and Pwning Apps and Servers on AWS and Azure** | [https://github.com/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training](https://github.com/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) | Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training! |[](https://badgen.net/github/stars/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)| [](https://badgen.net/github/contributors/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)[](https://badgen.net/github/watchers/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)[](https://badgen.net/github/last-commit/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) [](https://badgen.net/github/open-issues/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) [](https://badgen.net/github/closed-issues/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) |
224 | | **terragoat** | [https://github.com/bridgecrewio/terragoat](https://github.com/bridgecrewio/terragoat) | "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments. | [](https://badgen.net/github/stars/bridgecrewio/terragoat) | [](https://badgen.net/github/contributors/bridgecrewio/terragoat) [](https://badgen.net/github/watchers/bridgecrewio/terragoat) [](https://badgen.net/github/last-commit/bridgecrewio/terragoat) [](https://badgen.net/github/open-issues/bridgecrewio/terragoat) [](https://badgen.net/github/closed-issues/bridgecrewio/terragoat) |
225 | | **cfngoat** | [https://github.com/bridgecrewio/cfngoat](https://github.com/bridgecrewio/cfngoat) | "Vulnerable by Design" cloudformation repository. CfnGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments. | [](https://badgen.net/github/stars/bridgecrewio/cfngoat) | [](https://badgen.net/github/contributors/bridgecrewio/cfngoat) [](https://badgen.net/github/watchers/bridgecrewio/cfngoat) [](https://badgen.net/github/last-commit/bridgecrewio/cfngoat) [](https://badgen.net/github/open-issues/bridgecrewio/cfngoat) [](https://badgen.net/github/closed-issues/bridgecrewio/cfngoat) |
226 | | **CDKgoat** | [https://github.com/bridgecrewio/cdkgoat](https://github.com/bridgecrewio/cdkgoat) | "Vulnerable by Design" AWS CDK repository. CDKGoat is a learning and training project that demonstrates how common configuration errors can find their way into impartive IAC such as AWS CDK. | [](https://badgen.net/github/stars/bridgecrewio/cdkgoat) | [](https://badgen.net/github/contributors/bridgecrewio/cdkgoat) [](https://badgen.net/github/watchers/bridgecrewio/cdkgoat) [](https://badgen.net/github/last-commit/bridgecrewio/cdkgoat) [](https://badgen.net/github/open-issues/bridgecrewio/cdkgoat) [](https://badgen.net/github/closed-issues/bridgecrewio/cdkgoat) |
227 | | **aws_exposable_resources** | [https://github.com/SummitRoute/aws_exposable_resources](https://github.com/SummitRoute/aws_exposable_resources) | Resource types that can be publicly exposed on AWS | [](https://badgen.net/github/stars/SummitRoute/aws_exposable_resources) | [](https://badgen.net/github/contributors/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/watchers/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/last-commit/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/open-issues/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/closed-issues/SummitRoute/aws_exposable_resources) |
228 |
229 | ## Other interesting tools/code
230 |
231 | **Honey-token:**
232 |
233 | * [https://bitbucket.org/asecurityteam/spacecrab](https://bitbucket.org/asecurityteam/spacecrab)
234 | * [https://breachinsider.com/honey-buckets/](https://breachinsider.com/honey-buckets/)
235 | * [https://github.com/0x4D31/honeyLambda](https://github.com/0x4D31/honeyLambda)
236 | * [https://github.com/thinkst/canarytokens-docker](https://github.com/thinkst/canarytokens-docker)
237 |
238 | **More Resources:**
239 |
240 | * **asecure.cloud** [https://github.com/asecure.cloud](https://github.com/asecure.cloud) A repository of cutomizable AWS security configurations (Cloudformation and CLI templates)
241 | * **s3-leaks** [https://github.com/nagwww/s3-leaks](https://github.com/nagwww/s3-leaks) - a list of some biggest leaks recorded
242 | * **Model Risk AWS** [https://magoo.github.io/model-risk-aws/](https://magoo.github.io/model-risk-aws/) - POC about probabilistic risk model for AWS
243 | * **asecure.cloud** [https://asecure.cloud/](https://asecure.cloud/) - a great place for security resources regarding AWS Security.
244 | * **hoenybuckets** [https://github.com/honey-buckets/](https://github.com/honey-buckets/)
245 | * **thebuckhacker** [https://github.com/thebuckhacker](https://github.com/thebuckhacker)
246 | * **buckets.grayhatwarfare** [https://github.com/buckets.grayhatwarfare](https://github.com/buckets.grayhatwarfare)
247 | * **Cloud Security Newsletter by Marco Lancini** [https://cloudseclist.com/](https://cloudseclist.com/)
248 | * **Cloud Security Podcast by Ashish Rajan** [https://www.cloudsecuritypodcast.tv](www.cloudsecuritypodcast.tv)
249 | * **AWS Security Primer By Michael Wittig ** [https://cloudonaut.io/aws-security-primer/](https://cloudonaut.io/aws-security-primer/)
250 | * **Hacking The Cloud ** [https://hackingthe.cloud/](https://hackingthe.cloud/)
251 |
252 |
253 | ## License
254 | MIT License & [cc](https://creativecommons.org/licenses/by/4.0/) license
255 |
256 | 
This work is licensed under a Creative Commons Attribution 4.0 International License.
257 |
258 | To the extent possible under law, [Paul Veillard](https://github.com/paulveillard/) has waived all copyright and related or neighboring rights to this work.
259 |
--------------------------------------------------------------------------------