toniblyx/my-arsenal-of-aws-security-tools
GitHub: toniblyx/my-arsenal-of-aws-security-tools
一个面向 AWS 的开源安全工具列表,涵盖审计、取证、合规与权限治理,帮助团队统一管理云安全技术栈。
Stars: 9433 | Forks: 1578
## 目录
## 防御:加固、安全评估和清单
| 名称 | 描述 | 流行度 | 元数据 |
| ---------- | :---------- | :----------: | :----------: |
| **[Prowler](https://github.com/toniblyx/prowler)** | Prowler 是一款针对 AWS、Azure 和 GCP 的开源安全工具,用于执行云安全最佳实践评估、审计、事件响应、合规性、持续监控、加固和取证准备。包含 CIS、NIST 800、NIST CSF、CISA、FedRAMP、PCI-DSS、GDPR、HIPAA、FFIEC、SOC2、GXP、Well-Architected Security、ENS 等。 (Python) |[](https://badgen.net/github/stars/toniblyx/prowler)| [](https://badgen.net/github/contributors/toniblyx/prowler)[](https://badgen.net/github/watchers/toniblyx/prowler)[](https://badgen.net/github/last-commit/toniblyx/prowler) [](https://badgen.net/github/open-issues/toniblyx/prowler) [](https://badgen.net/github/closed-issues/toniblyx/prowler) |
| **[CloudMapper](https://github.com/duo-labs/cloudmapper)** | 帮助您分析 AWS 环境(Python) |[](https://badgen.net/github/stars/duo-labs/cloudmapper)| [](https://badgen.net/github/contributors/duo-labs/cloudmapper)[](https://badgen.net/github/watchers/duo-labs/cloudmapper)[](https://badgen.net/github/last-commit/duo-labs/cloudmapper) [](https://badgen.net/github/open-issues/duo-labs/cloudmapper) [](https://badgen.net/github/closed-issues/duo-labs/cloudmapper) |
| **[ScoutSuite](https://github.com/nccgroup/ScoutSuite)** | 多云安全审计工具,适用于 AWS、Google Cloud 和 Azure 环境(python) |[](https://badgen.net/github/stars/nccgroup/ScoutSuite)| [](https://badgen.net/github/contributors/nccgroup/ScoutSuite)[](https://badgen.net/github/watchers/nccgroup/ScoutSuite)[](https://badgen.net/github/last-commit/nccgroup/ScoutSuite) [](https://badgen.net/github/open-issues/nccgroup/ScoutSuite) [](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite) |
| **[CloudCustodian](https://github.com/cloud-custodian/cloud-custodian/)** | 云安全、成本优化和治理规则引擎,DSL 格式的 YAML 策略用于查询、过滤并对资源执行操作 |[](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) |
| **[ICE](https://badgen.net/github/stars/Teevity/ice)** | 从使用和成本角度提供高细节仪表板的洞察 |[](https://badgen.net/github/stars/Teevity/ice)| [](https://badgen.net/github/contributors/Teevity/ice)[](https://badgen.net/github/watchers/Teevity/ice)[](https://badgen.net/github/last-commit/Teevity/ice) [](https://badgen.net/github/open-issues/Teevity/ice) [](https://badgen.net/github/closed-issues/Teevity/ice) |
| **[CloudSploit Scans](https://github.com/cloudsploit/scans)** | AWS 安全扫描检查(NodeJS) |[](https://badgen.net/github/stars/cloudsploit/scans)| [](https://badgen.net/github/contributors/cloudsploit/scans)[](https://badgen.net/github/watchers/cloudsploit/scans)[](https://badgen.net/github/last-commit/cloudsploit/scans) [](https://badgen.net/github/open-issues/cloudsploit/scans) [](https://badgen.net/github/closed-issues/cloudsploit/scans) |
| **[AWS Network Access Analyzer](https://github.com/aws-samples/network-access-analyzer-multi-account-analysis)** | 自动化 Amazon VPC 网络访问分析器,以识别所有可能的互联网网关可达性,适用于所有 AWS 账户中的资源 |[](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)| [](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)[](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)[](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis) [](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis) [](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis) |
| **[CloudTracker](https://github.com/duo-labs/cloudtracker)** | 通过将 CloudTrail 日志与当前 IAM 策略进行比较,帮助您查找权限过高的 IAM 用户和角色(Python) |[](https://badgen.net/github/stars/duo-labs/cloudtracker)| [](https://badgen.net/github/contributors/duo-labs/cloudtracker)[](https://badgen.net/github/watchers/duo-labs/cloudtracker)[](https://badgen.net/github/last-commit/duo-labs/cloudtracker) [](https://badgen.net/github/open-issues/duo-labs/cloudtracker) [](https://badgen.net/github/closed-issues/duo-labs/cloudtracker) |
| **[AWS Security Benchmarks](https://github.com/awslabs/aws-security-benchmark)** | 与 AWS CIS 基础框架相关的脚本和模板指南(Python) |[](https://badgen.net/github/stars/awslabs/aws-security-benchmark)| [[](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)[](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark) [](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark) [](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark) |
| **[AWS Public IPs](https://github.com/arkadiyt/aws_public_ips)** | 获取与 AWS 账户关联的所有公网 IP 地址。支持 IPv4/IPv6、Classic/VPC 网络以及所有 AWS 服务(Ruby) |[](https://badgen.net/github/stars/arkadiyt/aws_public_ips)| [](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)[](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)[](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips) [](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips) [](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips) |
| **[PMapper](https://github.com/nccgroup/PMapper)** | 高级且自动化的 AWS IAM 评估(Python) |[](https://badgen.net/github/stars/nccgroup/PMapper)| [](https://badgen.net/github/contributors/nccgroup/PMapper)[](https://badgen.net/github/watchers/nccgroup/PMapper)[](https://badgen.net/github/last-commit/nccgroup/PMapper) [](https://badgen.net/github/open-issues/nccgroup/PMapper) [](https://badgen.net/github/closed-issues/nccgroup/PMapper) |
| **[nccgroup AWS-Inventory](https://github.com/nccgroup/aws-inventory)** | 对所有区域的资源进行清单统计(Python) |[](https://badgen.net/github/stars/nccgroup/aws-inventory)| [](https://badgen.net/github/contributors/nccgroup/aws-inventory)[](https://badgen.net/github/watchers/nccgroup/aws-inventory)[](https://badgen.net/github/last-commit/nccgroup/aws-inventory) [](https://badgen.net/github/open-issues/nccgroup/aws-inventory) [](https://badgen.net/github/closed-issues/nccgroup/aws-inventory) |
| **[Resource Counter](https://github.com/disruptops/resource-counter)** | 统计各区域范围内的资源数量 |[](https://badgen.net/github/stars/disruptops/resource-counter)| [](https://badgen.net/github/contributors/disruptops/resource-counter)[](https://badgen.net/github/watchers/disruptops/resource-counter)[](https://badgen.net/github/last-commit/disruptops/resource-counter) [](https://badgen.net/github/open-issues/disruptops/resource-counter) [](https://badgen.net/github/closed-issues/disruptops/resource-counter) |
| **[SkyArk](https://github.com/cyberark/SkyArk)** | 为测试的 AWS 中最特权实体提供高级发现和安全评估 |[](https://badgen.net/github/stars/cyberark/SkyArk)| [](https://badgen.net/github/contributors/cyberark/SkyArk)[](https://badgen.net/github/watchers/cyberark/SkyArk)[](https://badgen.net/github/last-commit/cyberark/SkyArk) [](https://badgen.net/github/open-issues/cyberark/SkyArk) [](https://badgen.net/github/closed-issues/cyberark/SkyArk) |
| **[findmytakeover](https://github.com/anirudhbiyani/findmytakeover)** | 在多云环境中查找悬空域名 | [](https://badgen.net/github/stars/anirudhbiyani/findmytakeover) | [](https://badgen.net/github/contributors/anirudhbiyani/findmytakeover) [](https://badgen.net/github/watchers/anirudhbiyani/findmytakeover) [](https://badgen.net/github/last-commit/anirudhbiyani/findmytakeover) [](https://badgen.net/github/open-issues/anirudhbiyani/findmytakeover) [](https://badgen.net/github/closed-issues/anirudhbiyani/findmytakeover) |
| **[Trailblazer AWS](https://github.com/willbengtson/trailblazer-aws)** | Trailblazer AWS 确定 CloudTrail 记录了哪些 AWS API 调用以及如何记录。您还可以使用 TrailBlazer 作为攻击模拟框架。 |[](https://badgen.net/github/stars/willbengtson/trailblazer-aws)| [](https://badgen.net/github/contributors/willbengtson/trailblazer-aws)[](https://badgen.net/github/watchers/willbengtson/trailblazer-aws)[](https://badgen.net/github/last-commit/willbengtson/trailblazer-aws) [](https://badgen.net/github/open-issues/willbengtson/trailblazer-aws) [](https://badgen.net/github/closed-issues/willbengtson/trailblazer-aws) |
| **[Lunar](https://github.com/lateralblast/lunar)** | 基于多个安全框架的安全审计工具(包含部分 AWS 检查) |[](https://badgen.net/github/stars/lateralblast/lunar)| [](https://badgen.net/github/contributors/lateralblast/lunar)[](https://badgen.net/github/watchers/lateralblast/lunar)[](https://badgen.net/github/last-commit/lateralblast/lunar) [](https://badgen.net/github/open-issues/lateralblast/lunar) [](https://badgen/github/closed-issues/lateralblast/lunar) |
| **[Cloud-reports](https://github.com/tensult/cloud-reports)** | 扫描您的 AWS 云资源并生成报告 |[](https://badgen.net/github/stars/tensult/cloud-reports)| [](https://badgen.net/github/contributors/tensult/cloud-reports)[](https://badgen.net/github/watchers/tensult/cloud-reports)[](https://badgen.net/github/last-commit/tensult/cloud-reports) [](https://badgen.net/github/open-issues/tensult/cloud-reports) [](https://badgen.net/github/closed-issues/tensult/cloud-reports) |
| **[Pacbot](https://github.com/tmobile/pacbot)** | 持续合规监控平台 — 合规报告和安全自动化(云) |[](https://badgen.net/github/stars/tmobile/pacbot)| [](https://badgen.net/github/contributors/tmobile/pacbot)[](https://badgen.net/github/watchers/tmobile/pacbot)[](https://badgen.net/github/last-commit/tmobile/pacbot) [](https://badgen.net/github/open-issues/tmobile/pacbot) [](https://badgen.net/github/closed-issues/tmobile/pacbot) |
| **[cs-suite](https://github.com/SecurityFTW/cs-suite)** | 集成 Scout2 和 Prowler 等工具 |[](https://badgen.net/github/stars/SecurityFTW/cs-suite)| [](https://badgen.net/github/contributors/SecurityFTW/cs-suite)[](https://badgen.net/github/watchers/SecurityFTW/cs-suite)[](https://badgen.net/github/last-commit/SecurityFTW/cs-suite) [](https://badgen.net/github/open-issues/SecurityFTW/cs-suite) [](https://badgen.net/github/closed-issues/SecurityFTW/cs-suite) |
| **[aws-key-disabler](https://github.com/te-papa/aws-key-disabler)** | 一个小型 Lambda 脚本,用于禁用超过指定天数的访问密钥 |[](https://badgen.net/github/stars/te-papa/aws-key-disabler)| [](https://badgen.net/github/contributors/te-papa/aws-key-disabler)[](https://badgen.net/github/watchers/te-papa/aws-key-disabler)[](https://badgen.net/github/last-commit/te-papa/aws-key-disabler) [](https://badgen.net/github/open-issues/te-papa/aws-key-disabler) [](https://badgen.net/github/closed-issues/te-papa/aws-key-disabler) |
| **[Antiope](https://github.com/turnerlabs/antiope)** | AWS 清单与合规框架 |[](https://badgen.net/github/stars/turnerlabs/antiope)| [](https://badgen.net/github/contributors/turnerlabs/antiope)[](https://badgen.net/github/watchers/turnerlabs/antiope)[](https://badgen.net/github/last-commit/turnerlabs/antiope) [](https://badgen.net/github/open-issues/turnerlabs/antiope) [](https://badgen.net/github/closed-issues/turnerlabs/antiope) |
| **[Cloud Reports](https://github.com/tensult/cloud-reports)** | 扫描您的 AWS 云资源并生成报告,包含安全最佳实践。 |[](https://badgen.net/github/stars/tensult/cloud-reports)| [](https://badgen.net/github/contributors/tensult/cloud-reports)[](https://badgen.net/github/watchers/tensult/cloud-reports)[](https://badgen.net/github/last-commit/tensult/cloud-reports) [](https://badgen.net/github/open-issues/tensult/cloud-reports) [](https://badgen.net/github/closed-issues/tensult/cloud-reports) |
| **[Terraform AWS Secure Baseline](https://github.com/nozaq/terraform-aws-secure-baseline)** | Terraform 模块,用于使用安全基线设置您的 AWS 账户 |[](https://badgen.net/github/stars/nozaq/terraform-aws-secure-baseline)| [](https://badgen.net/github/contributors/nozaq/terraform-aws-secure-baseline)[](https://badgen.net/github/watchers/nozaq/terraform-aws-secure-baseline)[](https://badgen.net/github/last-commit/nozaq/terraform-aws-secure-baseline) [](https://badgen.net/github/open-issues/nozaq/terraform-aws-secure-baseline) [](https://badgen.net/github/closed-issues/nozaq/terraform-aws-secure-baseline) |
| **[ZeusCloud](https://github.com/Zeus-Labs/ZeusCloud)** | 发现、优先处理并修复 AWS 云环境中的安全风险。 | [](https://badgen.net/github/stars/Zeus-Labs/ZeusCloud)| [](https://badgen.net/github/contributors/Zeus-Labs/ZeusCloud) [](https://badgen.net/github/watchers/Zeus-Labs/ZeusCloud) [](https://badgen.net/github/last-commit/Zeus-Labs/ZeusCloud) [](https://badgen.net/github/open-issues/Zeus-Labs/ZeusCloud) [](https://badgen.net/github/closed-issues/Zeus-Labs/ZeusCloud) |
| **[Cartography](https://github.com/lyft/cartography)** | Cartography 是一个 Python 工具,通过 Neo4j 数据库驱动的直观图形视图,整合基础设施资产及其之间的关系。 |[](https://badgen.net/github/stars/lyft/cartography)| [](https://badgen.net/github/contributors/lyft/cartography)[](https://badgen.net/github/watchers/lyft/cartography)[](https://badgen.net/github/last-commit/lyft/cartography) [](https://badgen.net/github/open-issues/lyft/cartography) [](https://badgen.net/github/closed-issues/lyft/cartography) |
| **[TrailScraper](https://github.com/flosell/trailscraper)** | 从 AWS CloudTrail 中提取有价值信息的命令行工具 |[](https://badgen.net/github/stars/flosell/trailscraper)| [](https://badgen.net/github/contributors/flosell/trailscraper)[](https://badgen.net/github/watchers/flosell/trailscraper)[](https://badgen.net/github/last-commit/flosell/trailscraper) [](https://badgen.net/github/open-issues/flosell/trailscraper) [](https://badgen.net/github/closed-issues/flosell/trailscraper) |
| **[Komiser](https://github.com/mlabouardy/komiser)** | 云环境检查器 — 在一个位置分析和管控云成本、使用情况、安全性和治理。 |[](https://badgen.net/github/stars/mlabouardy/komiser)| [](https://badgen.net/github/contributors/mlabouardy/komiser)[](https://badgen.net/github/watchers/mlabouardy/komiser)[](https://badgen.net/github/last-commit/mlabouardy/komiser) [](https://badgen.net/github/open-issues/mlabouardy/komiser) [](https://badgen.net/github/closed-issues/mlabouardy/komiser) |
| **[Perimeterator](https://github.com/darkarnium/perimeterator)** | AWS 周界监控。周期性扫描互联网面向的 AWS 资源以检测配置错误的服务。 |[](https://badgen.net/github/stars/darkarnium/perimeterator)| [](https://badgen.net/github/contributors/darkarnium/perimeterator)[](https://badgen.net/github/watchers/darkarnium/perimeterator)[](https://badgen.net/github/last-commit/darkarnium/perimeterator) [](https://badgen.net/github/open-issues/darkarnium/perimeterator) [](https://badgen.net/github/closed-issues/darkarnium/perimeterator) |
| **[PolicySentry](https://github.com/salesforce/policy_sentry)** | IAM 最小权限策略生成器、审计器和分析数据库 |[](https://badgen.net/github/stars/salesforce/policy_sentry)| [](https://badgen.net/github/contributors/salesforce/policy_sentry)[](https://badgen.net/github/watchers/salesforce/policy_sentry)[](https://badgen.net/github/last-commit/salesforce/policy_sentry) [](https://badgen.net/github/open-issues/salesforce/policy_sentry) [](https://badgen.net/github/closed-issues/salesforce/policy_sentry) |
| **[Zeus](https://github.com/DenizParlak/Zeus)** | AWS 审计与加固工具 |[](https://badgen.net/github/stars/DenizParlak/Zeus)| [](https://badgen.net/github/contributors/DenizParlak/Zeus)[](https://badgen.net/github/watchers/DenizParlak/Zeus)[](https://badgen.net/github/last-commit/DenizParlak/Zeus) [](https://badgen.net/github/open-issues/DenizParlak/Zeus) [](https://badgen.net/github/closed-issues/DenizParlak/Zeus) |
| **[janiko71 AWS-inventory](https://github.com/janiko71/aws-inventory)** | 用于 AWS 资源清单的 Python 脚本 |[](https://badgen.net/github/stars/janiko71/aws-inventory)| [](https://badgen.net/github/contributors/janiko71/aws-inventory)[](https://badgen.net/github/watchers/janiko71/aws-inventory)[](https://badgen.net/github/last-commit/janiko71/aws-inventory) [](https://badgen.net/github/open-issues/janiko71/aws-inventory) [](https://badgen.net/github/closed-issues/janiko71/aws-inventory) |
| **[awspx](https://github.com/fsecurelabs/awspx)** | 用于可视化 AWS 环境中有效访问和资源关系的基于图形工具 |[](https://badgen.net/github/stars/fsecurelabs/awspx)| [](https://badgen.net/github/contributors/fsecurelabs/awspx)[](https://badgen.net/github/watchers/fsecurelabs/awspx)[](https://dev.azure.com/fsecurelabs/awspx/_git/awspx) [](https://badgen.net/github/open-issues/fsecurelabs/awspx) [](https://badgen.net/github/closed-issues/fsecurelabs/awspx) |
| **[clinv](https://github.com/lyz-code/clinv)** | DevSecOps 命令行资产清单工具 |[](https://badgen.net/github/stars/lyz-code/clinv)| [](https://badgen.net/github/contributors/lyz-code/clinv)[](https://badgen.net/github/watchers/lyz-code/clinv)[](https://badgen.net/github/last-commit/lyz-code/clinv) [](https://badgen.net/github/open-issues/lyz-code/clinv) [](https://badgen.net/github/closed-issues/lyz-code/clinv) |
| **[aws-gate](https://github.com/xen0l/aws-gate)** | 增强的 AWS SSM 会话管理器 CLI 客户端 |[](https://badgen.net/github/stars/xen0l/aws-gate)| [](https://badgen.net/github/contributors/xen0l/awsate)[](https://badgen.net/github/watchers/xen0l/aws-gate)[](https://badgen.net/github/last-commit/xen0l/aws-gate) [](https://badgen.net/github/open-issues/xen0l/aws-gate) [](https://badgen.net/github/closed-issues/xen0l/aws-gate) |
| **[Detecting Credential Compromise](https://github.com/Netflix-Skunkworks/aws-credential-compromise-detection)** | 检测 AWS 中的凭据泄露 |[](https://badgen.net/github/stars/Netflix-Skunkworks/aws-credential-compromise-detection)| [](https://badgen.net/github/contributors/Netflix-Skunkworks/aws-credential-compromise-detection)[](https://badgen.net/github/watchers/Netflix-Skunkworks/aws-credential-compromise-detection)[](https://badgen.net/github/last-commit/Netflix-Skunkworks/aws-credential-compromise-detection) [](https://badgen.net/github/open-issues/Netflix-Skunkworks/aws-credential-compromise-detection) [](https://badgen.net/github/closed-issues/Netflix-Skunkworks/aws-credential-compromise-detection)|
| **[AWS-Security-Toolbox (AST)](https://github.com/z0ph/aws-security-toolbox)** | AWS 安全工具箱(Docker 镜像),用于安全评估 |[](https://badgen.net/github/stars/z0ph/aws-security-toolbox)| [](https://badgen.net/github/contributors/z0ph/aws-security-toolbox) [](https://badgen.net/github/watchers/z0ph/aws-security-toolbox) [](https://badgen.net/github/last-commit/z0ph/aws-security-toolbox) [](https://badgen.net/github/open-issues/z0ph/aws-security-toolbox) [](https://badgen.net/github/closed-issues/z0ph/aws-security-toolbox) |
| **[iam-lint](https://github.com/xen0l/iam-lint)** | GitHub Action,用于对 AWS IAM 策略文档进行正确性和潜在安全问题检查 |[](https://badgen.net/github/stars/xen0l/iam-lint)| [](https://badgen.net/github/contributors/xen0l/iam-lint)[](https://badgen.net/github/watchers/xen0l/iam-lint)[](https://badgen.net/github/last-commit/xen0l/iam-lint) [](https://badgen.net/github/open-issues/xen0l/iam-lint) [](https://badgen.net/github/closed-issues/xen0l/iam-lint) |
| **[aws-security-viz](https://github.com/anaynayak/aws-security-viz)** | 用于可视化 AWS 安全组。 |[](https://badgen.net/github/stars/anaynayak/aws-security-viz)| [](https://badgen.net/github/contributors/anaynayak/aws-security-viz)[](https://badgen.net/github/watchers/anaynayak/aws-security-viz)[](https://badgen.net/github/last-commit/anaynayak/aws-security-viz) [](https://badgen.net/github/open-issues/anaynayak/aws-security-viz) [](https://badgen.net/github/closed-issues/anaynayak/aws-security-viz) |
| **[AirIAM](https://github.com/bridgecrewio/AirIAM)** | 使用 Terraform 实现 AWS IAM 的最小权限原则 |[](https://badgen.net/github/stars/bridgecrewio/AirIAM)| [](https://badgen.net/github/contributors/bridgecrewio/AirIAM) [](https://badgen.net/github/watchers/bridgecrewio/AirIAM) [](https://badgen.net/github/last-commit/bridgecrewio/AirIAM) [](https://badgen.net/github/open-issues/bridgecrewio/AirIAM) [](https://badgen.net/github/closed-issues/bridgecrewio/AirIAM) |
| **[Cloudsplaining](https://github.com/salesforce/cloudsplaining)** | AWS IAM 安全评估工具,用于识别最小权限违规并生成风险优先级 HTML 报告。 |[](https://badgen.net/github/stars/salesforce/cloudsplaining)| [](https://badgen.net/github/contributors/salesforce/cloudsplaining) [](https://badgen.net/github/watchers/salesforce/cloudsplaining) [](https://badgen.net/github/last-commit/salesforce/cloudsplaining) [](https://badgen.net/github/open-issues/salesforce/cloudsplaining) [](https://badgen.net/github/closed-issues/salesforce/cloudsplaining) |
| **[iam-policy-generator](https://github.com/aletheia/iam-policy-generator)** | 一个简单的库,用于生成 IAM 策略语句,无需记忆所有操作 API | [](https://aletheia/iam-policy-generator) | [](https://badgen.net/github/contributors/aletheia/iam-policy-generator) [](https://badgen.net/github/watchers/aletheia/iam-policy-generator) [](https://badgen.net/github/last-commit/aletheia/iam-policy-generator) [](https://badgen.net/github/open-issues/aletheia/iam-policy-generator) [](https://badgen.net/github/closed-issues/aletheia/iam-policy-generator) |
| **[SkyWrapper](https://github.com/cyberark/SkyWrapper)** | SkyWrapper 有助于发现临时令牌的创建形式和可疑使用。 | [](https://badgen.net/github/stars/cyberark/SkyWrapper) | [](https://badgen.net/github/contributors/cyberark/SkyWrapper) [](https://badgen.net/github/watchers/cyberark/SkyWrapper) [](https://badgen.net/github/last-commit/cyberark/SkyWrapper) [](https://badgen.net/github/open-issues/cyberark/SkyWrapper) [](https://badgen.net/github/closed-issues/cyberark/SkyWrapper) |
| **[aws-recon](https://github.com/darkbitio/aws-recon)** | 多线程 AWS 库存收集工具 | [](https://badgen.net/github/stars/darkbitio/aws-recon) | [](https://badgen.net/github/contributors/darkbitio/aws-recon) [](https://badgen.net/github/watchers/darkbitio/aws-recon) [](https://badgen.net/github/last-commit/darkbitio/aws-recon) [](https://badgen.net/github/open-issues/darkbitio/aws-recon) [](https://badgen.net/github/closed-issues/darkbitio/aws-recon) |
| **[iam-policies-cli](https://github.com/mhlabs/iam-policies-cli)** | 用于构建简单到复杂 IAM 策略的 CLI 工具 | [](https://badgen.net/github/stars/mhlabs/iam-policies-cli) | [](https://badgen.net/github/contributors/mhlabs/iam-policies-cli) [](https://badgen.net/github/watchers/mhlabs/iam-policies-cli) [](https://badgen.net/github/last-commit/mhlabs/iam-policies-cli) [](https://badgen.net/github/open-issues/mhlabs/iam-policies-cli) [](https://badgen.net/github/closed-issues/mhlabs/iam-policies-cli) |
| **[Aaia](https://github.com/rams3sh/Aaia)** | AWS 身份和访问管理可视化工具与异常检测工具 | [](https://badgen.net/github/stars/rams3sh/Aaia) | [](https://badgen.net/github/contributors/rams3sh/Aaia) [](https://badgen.net/github/watchers/rams3sh/Aaia) [](https://badgen.net/github/last-commit/rams3sh/Aaia) [](https://badgen.net/github/open-issues/rams3sh/Aaia) [](https://badgen.net/github/closed-issues/rams3sh/Aaia) |
| **[iam-floyd](https://github.com/udondan/iam-floyd)** | IAM 策略语句生成器,支持流畅接口 — 提供 Node.js、Python、.Net 和 Java 版本 | [](https://badgen.net/github/stars/udondan/iam-floyd) | [](https://badgen.net/github/contributors/udondan/iam-floyd)[](https://badgen.net/github/watchers/udondan/iam-floyd)[](https://badgen.net/github/last-commit/udondan/iam-floyd) [](https://badgen.net/github/open-issues/udondan/iam-floyd) [](https://badgen.net/github/closed-issues/udondan/iam-floyd) |
| **[rpCheckup](https://github.com/goldfiglabs/rpCheckup)** | AWS 资源策略安全检查工具,可识别公共访问、外部账户访问、内部账户访问及私有资源。 | [](https://badgen.net/github/stars/goldfiglabs/rpCheckup) | [](https://badgen.net/github/contributors/goldfiglabs/rpCheckup) [](https://badgen.net/github/watchers/goldfiglabs/rpCheckup) [](https://badgen.net/github/last-commit/goldfiglabs/rpCheckup) [](https://badgen.net/github/open-issues/goldfiglabs/rpCheckup) [](https://badgen.net/github/closed-issues/goldfiglabs/rpCheckup) |
| **[S3 Exif Cleaner](https://github.com/seisvelas/S3-Exif-Cleaner)** | 从 S3 存储桶中移除所有对象的 EXIF 数据 |[](https://badgen.net/github/stars/seisvelas/S3-Exif-Cleaner)| [](https://badgen.net/github/contributors/seisvelas/S3-Exif-Cleaner)[](https://badgen.net/github/watchers/seisvelas/S3-Exif-Cleaner)[](https://badgen.net/github/last-commit/seisvelas/S3-Exif-Cleaner) [](https://badgen.net/github/open-issues/seisvelas/S3-Exif-Cleaner) [](https://badgen.net/github/closed-issues/seisvelas/S3-Exif-Cleaner) |
| **[Steampipe](https://github.com/turbot/steampipe)** | 使用 SQL 即时查询您的云服务(AWS、Azure、GCP 等)。开源 CLI,无需数据库。 (SQL) |[](https://badgen.net/github/stars/turbot/steampipe)| [](https://badgen.net/github/contributors/turbot/steampipe)[](https://badgen.net/github/watchers/turbot/steampipe)[](https://badgen.net/github/last-commit/turbot/steampipe/main) [](https://badgen.net/github/open-issues/turbot/steampipe) [](https://badgen.net/github/closed-issues/turbot/steampipe) |
| **[access-undenied-aws](https://github.com/ermetic/access-undenied-aws)** | 解析 AWS AccessDenied CloudTrail 事件,说明原因并提供可操作的修复步骤。 | [](https://badgen.net/github/stars/ermetic/access-undenied-aws) | [](https://badgen.net/github/contributors/ermetic/access-undenied-aws) [](https://badgen.net/github/watchers/ermetic/access-undenied-aws) [](https://badgen.net/github/last-commit/ermetic/access-undenied-aws) [](https://badgen.net/github/open-issues/ermetic/access-undenied-aws) [](https://badgen.net/github/closed-issues/ermetic/access-undenied-aws) |
| **[Metabadger](https://github.com/salesforce/metabadger)** | 通过自动到更安全的实例元数据服务 v2 (IMDSv2) 防止 AWS EC2 上的 SSRF 攻击。 |[](https://badgen.net/github/stars/salesforce/metabadger)| [](https://badgen.net/github/contributors/salesforce/metabadger)[](https://badgen.net/github/watchers/salesforce/metabadger)[](https://badgen.net/github/last-commit/salesforce/metabadger) [](https://badgen.net/github/open-issues/salesforce/metabadger) [](https://badgen.net/github/closed-issues/salesforce/metabadger) |
| **[AWS-Firewall Factory](https://github.com/globaldatanet/aws-firewall-factory)** | 部署、更新并集中管理 WAF(通过 FMS/CDK) |[](https://badgen.net/github/stars/globaldatanet/aws-firewall-factory)| [](https://badgen.net/github/contributors/globaldatanet/aws-firewall-factory)[](https://badgen.net/github/watchers/globaldatanet/aws-firewall-factory)[](https://badgen.net/github/last-commit/globaldatanet/aws-firewall-factory) [](https://badgen.net/github/open-issues/globaldatanet/aws-firewall-factory) [](https://badgen.net/github/closed-issues/globaldatanet/aws-firewall-factory) |
| **[IAMSpy](https://github.com/WithSecureLabs/IAMSpy)** | 使用 Z3 证明器来尝试回答有关 AWS IAM 的问题的库。 |[](https://badgen.net/github/stars/WithSecureLabs/IAMSpy)| [](https://badgen.net/github/contributors/WithSecureLabs/IAMSpy) [](https://badgen.net/github/watchers/WithSecureLabs/IAMSpy) [](https://badgen.net/github/last-commit/WithSecureLabs/IAMSpy) [](https://badgen.net/github/open-issues/WithSecureLabs/IAMSpy) [](https://badgen.net/github/closed-issues/WithSecureLabs/IAMSpy) |
| **[nuvola](https://github.com/primait/nuvola)** | 转储并使用预定义、可扩展和自定义规则(采用简单的 YAML 语法)对 AWS 环境配置和服务进行自动和手动安全分析。 |[](https://badgen.net/github/stars/primait/nuvola)| [](https://badgen.net/github/contributors/primait/nuvola)[](https://badgen.net/github/watchers/primait/nuvola)[](https://badgen.net/github/last-commit/primait/nuvola) [](https://badgen.net/github/open-issues/primait/nuvola) [](https://badgen.net/github/closed-issues/primait/nuvola) |
| **[aws-security-architectures](https://github.com/cjsrkd3321/aws-security-architectures)** | AWS 安全架构(Detect、Alarm、Macie 等)。未来将添加更多架构。 |[](https://badgen.net/github/stars/cjsrkd3321/aws-security-architectures)| [](https://badgen.net/github/contributors/cjsrkd3321/aws-security-architectures)[](https://badgen.net/github/watchers/cjsrkd3321/aws-security-architectures) [](https://badgen.net/github/last-commit/cjsrkd3321/aws-security-architectures) [](https://badgen.net/github/open-issues/cjsrkd3321/aws-security-architectures) [](https://badgen.net/github/closed-issues/cjsrkd3321/aws-security-architectures) |
| **[MetaHub for AWS Security Hub](https://github.com/gabrielsoltz/metahub)** | MetaHub 是 AWS Security Hub 的 CLI 实用程序,提供额外功能,如按受影响资源分组发现结果、执行 MetaChecks 和 MetaTags 直接在受影响资源上以丰富发现结果、针对 MetaChecks 和 MetaTags 的过滤器、不同格式的报告(CSV、JSON 和 HTML)、批量更新,以及直接在 AWS Security Hub 中丰富发现结果。 | [](https://badgen.net/github/stars/gabrielsoltz/metahub) | [](https://badgen.net/github/contributors/gabrielsoltz/metahub) [](https://badgen.net/github/watchers/gabrielsoltz/metahub) [](https://badgen.net/github/last-commit/gabrielsoltz/metahub) [](https://badgen.net/github/open-issues/gabrielsoltz/metahub) [](https://badgen.net/github/closed-issues/gabrielsoltz/metahub) |
| **[Matano](https://github.com/matanolabs/matano)** | Matano 是一个开源的云原生安全湖平台(SIEM 替代方案),用于 AWS 上的威胁狩猎、检测与响应以及网络安全分析,容量达到 PB 级。 | [](https://badgen.net/github/stars/matanolabs/matano) | [](https://badgen.net/github/contributors/matanolabs/matano) [](https://badgen.net/github/watchers/matanolabs/matano) [](https://badgen.net/github/last-commit/matanolabs/matano) [](https://badgen.net/github/open-issues/matanolabs/matano) [](https://badgen.net/github/closed-issues/matanolabs/matano) |
| **[aws-list-resources](https://github.com/welldone-cloud/aws-list-resources)** | 使用 AWS Cloud Control API 列出给定 AWS 账户和区域中存在的资源。发现的资源将写入 JSON 输出文件。 | [](https://badgen.net/github/stars/welldone-cloud/aws-list-resources) | [](https://badgen.net/github/contributors/welldone-cloud/aws-list-resources) [](https://badgen.net/github/watchers/welldone-cloud/aws-list-resources) [](https://badgen.net/github/last-commit/welldone-cloud/aws-list-resources) [](https://badgen.net/github/open-issues/welldone-cloud/aws-list-resources) [](https://badgen.net/github/closed-issues/welldone-cloud/aws-list-resources) |
| **[aws-summarize-account-activity](https://github.com/welldone-cloud/aws-summarize-account-activity)** | 分析给定 AWS 账户的 CloudTrail 数据,生成 IAM 主体、API 调用和区域的最近活动摘要。摘要将写入 JSON 输出文件,并可选择性可视化为 PNG 文件。 | [](https://badgen.net/github/stars/welldone-cloud/aws-summarize-account-activity) | [](https://badgen.net/github/contributors/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/watchers/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/last-commit/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/open-issues/welldone-cloud/aws-summarize-account-activity) [](https://badgen.net/github/closed-issues/welldone-cloud/aws-summarize-account-activity) |
| **[aws-lint-iam-policies](https://github.com/welldone-cloud/aws-lint-iam-policies)** | 针对单个 AWS 账户或整个 AWS 组织运行 IAM 策略检查。报告违反安全最佳实践或包含错误的策略。支持身份策略和资源策略。 | [](https://badgen.net/github/stars/welldone-cloud/aws-lint-iam-policies) | [](https://badgen.net/github/contributors/welldone-cloud/aws-lint-iam-policies) [](https://badgen.net/github/watchers/welldone-cloud/aws-lint-iam-policies) [](https://badgen.net/github/last-commit/welldone-cloud/aws-lint-iam-policies) [](https://badgen.net/github/open-issues/welldone-cloud/aws-lint-iam-policies) [](https://badgen.net/github/closed-issues/welldone-cloud/aws-lint-iam-policies) |
| **[cloud-audit](https://haitmg.pl/cloud-audit/)** | AWS 安全扫描器,包含 31 个攻击链(将发现结果关联到利用路径)和 IAM 权限提升分析(25 种方法,取代了已废弃的 PMapper)。94 个定制检查覆盖 23 个 AWS 服务,每项发现均提供可直接复制粘贴的 AWS CLI + Terraform 修复方案。CIS AWS v3.0 合规性自动化程度达 89%。2026 年 3 月被 Help Net Security 报道。 (Python) | [](https://badgen.net/github/stars/gebalamariusz/cloud-audit) | [](https://badgen.net/github/contributors/gebalamariusz/cloud-audit) [](https://badgen.net/github/watchers/gebalamariusz/cloud-audit) [](https://badgen.net/github/last-commit/gebalamariusz/cloud-audit) [](https://badgen.net/github/open-issues/gebalamariusz/cloud-audit) [](https://badgen.net/github/closed-issues/gebalamariusz/cloud-audit) |
## 进攻
| 名称 | 描述 | 流行度 | 元数据 |
| ---------- | :---------- | :----------: | :----------: |
| **[cloudfox](https://github.com/BishopFox/cloudfox)** | 查找云基础设施中可利用的攻击路径 |[](https://badgen.net/github/stars/BishopFox/cloudfox)| [](https://badgen.net/github/contributors/BishopFox/cloudfox)[](https://badgen.net/github/watchers/BishopFox/cloudfox)[](https://badgen.net/github/last-commit/BishopFox/cloudfox) [](https://badgen.net/github/open-issues/BishopFox/cloudfox) [](https://badgen.net/github/closed-issues/BishopFox/cloudfox) |
| **[WeirdAAL](https://github.com/carnal0wnage/weirdAAL)** | AWS 攻击库 |[](https://badgen.net/github/stars/carnal0wnage/weirdAAL)| [](https://badgen.net/github/contributors/carnal0wnage/weirdAAL)[](https://badgen.net/github/watchers/carnal0wnage/weirdAAL)[](https://badgen.net/github/last-commit/carnal0wnage/weirdAAL) [](https://badgen.net/github/open-issues/carnal0wnage/weirdAAL) [](https://badgen.net/github/closed-issues/carnal0wnage/weirdAAL) |
| **[Pacu](https://github.com/RhinoSecurityLabs/pacu)** | AWS 渗透测试工具包 |[](https://badgen.net/github/stars/RhinoSecurityLabs/pacu)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/pacu)[](https://badgen.net/github/watchers/RhinoSecurityLabs/pacu)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/pacu) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/pacu) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/pacu) |
| **[Cred Scanner](https://github.com/disruptops/cred_scanner)** | 简单的文件扫描器,用于查找潜在的 AWS 访问密钥和秘密密钥 |[](https://badgen.net/github/stars/disruptops/cred_scanner)| [](https://badgen.net/github/contributors/disruptops/cred_scanner)[](https://badgen.net/github/watchers/disruptops/cred_scanner)[](https://badgen.net/github/last-commit/disruptops/cred_scanner) [](https://badgen.net/github/open-issues/disruptops/cred_scanner) [](https://badgen.net/github/closed-issues/disruptops/cred_scanner) |
| **[AWS PWN](https://github.com/dagrz/aws_pwn)** | 一套 AWS 渗透测试工具合集 |[](https://badgen.net/github/stars/dagrz/aws_pwn)| [](https://badgen.net/github/cont/dagrz/aws_pwn)[](https://badgen.net/github/watchers/dagrz/aws_pwn)[](https://badgen.net/github/last-commit/dagrz/aws_pwn) [](https://badgen.net/github/open-issues/dagrz/aws_pwn) [](https://badgen.net/github/closed-issues/dagrz/aws_pwn) |
| **[Cloudfrunt](https://github.com/MindPointGroup/cloudfrunt)** | 用于识别配置错误的 CloudFront 域名的工具 |[](https://badgen.net/github/stars/MindPointGroup/cloudfrunt)| [](https://badgen.net/github/contributors/MindPointGroup/cloudfrunt)[](https://badgen.net/github/watchers/MindPointGroup/cloudfrunt)[](https://badgen.net/github/last-commit/MindPointGroup/cloudfrunt) [](https://badgen.net/github/open-issues/MindPointGroup/cloudfrunt) [](https://badgen.net/github/closed-issues/MindPointGroup/cloudfrunt) |
| **[Cloudjack](https://github.com/prevade/cloudjack)** | Route53/CloudFront 漏洞评估工具 |[](https://badgen.net/github/stars/prevade/cloudjack)| [](https://badgen.net/github/contributors/prevade/cloudjack)[](https://badgen.net/github/watchers/prevade/cloudjack)[](https://badgen.net/github/last-commit/prevade/cloudjack) [](https://badgen.net/github/open-issues/prevade/cloudjack) [](https://badgen.net/github/closed-issues/prevade/cloudjack) |
| **[Nimbostratus](https://github.com/andresriancho/nimbostratus)** | 用于识别和利用 Amazon 云基础设施的工具 |[](https://badgen.net/github/stars/andresriancho/nimbostratus)| [](https://badgen.net/github/contributors/andresriancho/nimbostratus)[](https://badgen.net/github/watchers/andresriancho/nimbostratus)[](https://badgen.net/github/last-commit/andresriancho/nimbostratus) [](https://badgen.net/github/open-issues/andresriancho/nimbostratus) [](https://badgen.net/github/closed-issues/andresriancho/nimbostratus) |
| **[GitLeaks](https://github.com/zricethezav/gitleaks)** | 审计 Git 仓库中的密钥 |[](https://badgen.net/github/stars/zricethezav/gitleaks)| [](https://badgen.net/github/contributors/zricethezav/gitleaks)[](https://badgen.net/github/watchers/zricethezav/gitleaks)[](https://badgen.net/github/last-commit/zricethezav/gitleaks) [](https://badgen.net/github/open-issues/zricethezav/gitleaks) [](https://badgen.net/github/closed-issues/zricethezav/gitleaks) |
| **[TruffleHog](https://github.com/dxa4481/truffleHog)** | 在 Git 仓库中搜索高熵字符串和密钥,深入挖掘提交历史 |[](https://badgen.net/github/stars/dxa4481/truffleHog)| [](https://badgen.net/github/contributors/dxa4481/truffleHog)[](https://badgen.net/github/watchers/dxa4481/truffleHog)[](https://badgen.net/github/last-commit/dxa4481/truffleHog) [](https://badgen.net/github/open-issues/dxa4481/truffleHog) [](https://badgen.net/github/closed-issues/dxa4481/truffleHog) |
| **[DumpsterDiver](https://github.com/securing/DumpsterDiver)** | "用于搜索各种文件类型中的密钥,例如 AWS 访问密钥、Azure 共享密钥或 SSH 密钥等。" |[](https://badgen.net/github/stars/securing/DumpsterDiver)| [](https://badgen.net/github/contributors/securing/DumpsterDiver)[](https://badgen.net/github/watchers/securing/DumpsterDiver)[](https://badgen.net/github/last-commit/securing/DumpsterDiver) [](https://badgen.net/github/open-issues/securing/DumpsterDiver) [](https://badgen.net/github/closed-issues/securing/DumpsterDiver) |
| **[Mad-King](https://github.com/ThreatResponse/mad-king)** | 基于 Zappa 的 AWS 持久化和攻击平台 |[](https://badgen.net/github/stars/ThreatResponse/mad-king)| [](https://badgen.net/github/contributors/ThreatResponse/mad-king)[](https://badgen.net/github/watchers/ThreatResponse/mad-king)[](https://badgen.net/github/last-commit/ThreatResponse/mad-king) [](https://badgen.net/github/open-issues/ThreatResponse/mad-king) [](https://badgen.net/github/closed-issues/ThreatResponse/mad-king) |
| **[Cloud-Nuke](https://github.com/gruntwork-io/cloud-nuke)** | 用于清理云账户的工具,可删除(nuke)其中的所有资源 |[](https://badgen.net/github/stars/gruntwork-io/cloud-nuke)| [](https://badgen.net/github/contributors/gruntwork-io/cloud-nuke)[](https://badgen.net/github/watchers/gruntwork-io/cloud-nuke)[](https://badgen.net/github/last-commit/gruntwork-io/cloud-nuke) [](https://badgen.net/github/open-issues/gruntwork-io/cloud-nuke) [](https://badgen.net/github/closed-issues/work-io/cloud-nuke) |
| **[MozDef - The Mozilla Defense Platform](https://github.com/mozilla/MozDef)** | Mozilla 防御平台,旨在自动化安全事件处理流程并促进实时事件响应活动。 |[](https://badgen.net/github/stars/mozilla/MozDef)| [](https://badgen.net/github/contributors/mozilla/MozDef)[](https://badgen.net/github/watchers/mozilla/MozDef)[](https://badgen.net/github/last-commit/mozilla/MozDef) [](https://badgen.net/github/open-issues/mozilla/MozDef) [](https://badgen.net/github/closed-issues/mozilla/MozDef) |
| **[Lambda-Proxy](https://github.com/puresec/lambda-proxy)** | 在 SQLMap 和 AWS Lambda 之间建立桥梁,使您能够使用 SQLMap 原生测试 AWS Lambda 函数是否存在 SQL 注入漏洞。 |[](https://badgen.net/github/stars/puresec/lambda-proxy)| [](https://badgen.net/github/contributors/puresec/lambda-proxy)[](https://badgen.net/github/watchers/puresec/lambda-proxy)[](https://badgen.net/github/last-commit/puresec/lambda-proxy) [](https://badgen.net/github/open-issues/puresec/lambda-proxy) [](https://badgen.net/github/closed-issues/puresec/lambda-proxy) |
| **[CloudCopy](https://github.com/Static-Flow/CloudCopy)** | 针对域控制器运行在 AWS 上的 Shadow Copy 攻击,仅需 EC2:CreateSnapshot 权限即可 |[](https://badgen.net/github/stars/Static-Flow/CloudCopy)| [](https://badgen.net/github/contributors/Static-Flow/CloudCopy)[](https://badgen.net/github/watchers/Static-Flow/CloudCopy)[](https://badgen.net/github/last-commit/Static-Flow/CloudCopy) [](https://badgen.net/github/open-issues/Static-Flow/CloudCopy) [](https://badgen.net/github/closed-issues/Static-Flow/CloudCopy) |
| **[enumerate-iam](https://github.com/andresriancho/enumerate-iam)** | 枚举与 AWS 凭证集相关联的权限 |[](https://badgen.net/github/stars/andresriancho/enumerate-iam)| [](https://badgen.net/github/contributors/andresriancho/enumerate-iam)[](https://badgen.net/github/watchers/andresriancho/enumerate-iam)[](https://badgen.net/github/last-commit/andresriancho/enumerate-iam) [](https://badgen.net/github/open-issues/andresriancho/enumerate-iam) [](https://badgen.net/github/closed-issues/andresriancho/enumerate-iam) |
| **[Barq](https://github.com/Voulnet/barq)** | 一个后利用框架,可让您轻松地在运行中的 AWS 基础设施上执行攻击。 |[](https://badgen.net/github/stars/Voulnet/barq)| [](https://badgen.net/github/contributors/Voulnet/barq)[](https://badgen.net/github/watchers/Voulnet/barq)[](https://badgen.net/github/last-commit/Voulnet/barq) [](https://badgen.net/github/open-issues/Voulnet/barq) [](https://badgen.net/github/closed-issues/Voulnet/barq) |
| **[CCAT](https://github.com/RhinoSecurityLabs/ccat)** | 云容器攻击工具 (CCAT),用于测试容器环境的安全性。 |[](https://badgen.net/github/stars/RhinoSecurityLabs/ccat)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/ccat)[](https://badgen.net/github/watchers/RhinoSecurityLabs/ccat)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/ccat) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/ccat) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/ccat) |
| **[Dufflebag](https://github.com/bishopfox/dufflebag)** | 搜索暴露的 EBS 卷以查找密钥 | [](https://badgen.net/github/stars/bishopfox/dufflebag) | [](https://badgen.net/github/contributors/bishopfox/dufflebag) [](https://badgen.net/github/watchers/bishopfox/dufflebag) [](https://badgen.net/github/last-commit/bishopfox/dufflebag) [](https://badgen.net/github/open-issues/bishopfox/dufflebag) [](https://badgen.net/github/closed-issues/bishopfox/dufflebag) |
| **[attack_range](https://github.com/splunk/attack_range)** | 一个工具,允许您创建易受攻击的工具化本地或云环境,将攻击数据收集到 Splunk 中 | [](https://badgen.net/github/stars/splunk/attack_range) | [](https://badgen.net/github/contributors/splunk/attack_range) [](https://badgen.net/github/watchers/splunk/attack_range) [](https://badgen.net/github/last-commit/splunk/attack_range) [](https://badgen.net/github/open-issues/splunk/attack_range) [](https://badgen.net/github/closed-issues/splunk/attack_range) |
| **[whispers](https://github.com/Skyscanner/whispers)** | 识别硬编码的密钥和危险行为 | [](https://badgen.net/github/stars/Skyscanner/whispers) | [](https://badgen.net/github/contributors/Skyscanner/whispers)[](https://badgen.net/github/watchers/yscanner/whispers)[](https://badgen.net/github/last-commit/Skyscanner/whispers) [](https://badgen.net/github/open-issues/Skyscanner/whispers) [](https://badgen.net/github/closed-issues/Skyscanner/whispers) |
| **[Redboto](https://github.com/elitest/Redboto)** | Red Team AWS 脚本 |[](https://badgen.net/github/stars/elitest/Redboto)| [](https://badgen.net/github/contributors/elitest/Redboto) [](https://badgen.net/github/watchers/elitest/Redboto)[](https://badgen.net/github/last-commit/elitest/Redboto) [](https://badgen.net/github/open-issues/elitest/Redboto) [](https://badgen.net/github/closed-issues/elitest/Redboto) |
| **[CloudBrute](https://github.com/0xsha/cloudbrute)** | 用于查找公司(目标)基础设施、文件和应用程序的云提供商工具 | [](https://badgen.net/github/stars/0xsha/cloudbrute) | [](https://badgen.net/github/contributors/0xsha/cloudbrute) [](https://badgen.net/github/watchers/0xsha/cloudbrute) [](https://badgen.net/github/last-commit/0xsha/cloudbrute) [](https://badgen.net/github/open-issues/0xsha/cloudbrute) [](https://badgen.net/github/closed-issues/0xsha/cloudbrute) |
## 紫色团队与对手模拟
| 名称 | 描述 | 流行度 | 元数据 |
| ---------- | :---------- | :----------: | :----------: |
| **[Stratus Red Team](https://github.com/datadog/stratus-red-team)** | 粒度、可操作的对手模拟,用于云环境 | [](https://badgen.net/github/stars/datadog/stratus-red-team) | [](https://badgen.net/github/contributors/datadog/stratus-red-team) [](https://badgen.net/github/watchers/datadog/stratus-red-team) [](https://badgen.net/github/last-commit/datadog/stratus-red-team) [](https://badgen.net/github/open-issues/datadog/stratus-red-team) [](https://badgen.net/github/closed-issues/datadog/stratus-red-team) |
| **[Leonidas](https://github.com/fsecurelabs/leonidas)** | 云中完整的攻击模拟,包含检测用例。 | [](https://badgen.net/github/stars/fsecurelabs/leonidas) | [](https://badgen.net/github/contributors/fsecurelabs/leonidas) [](https://badgen.net/github/watchers/fsecurelabs/leonidas) [](https://badgen.net/github/last-commit/fsecurelabs/leonidas) [](https://badgen.net/github/open-issues/fsecurelabs/leonidas) [](https://badgen.net/github/closed-issues/fsecurelabs/leonidas) |
| **[Amazon Guardduty Tester](https://github.com/awslabs/amazon-guardduty-tester)** | 此脚本用于生成 GuardDuty 服务的基本检测。 | [](https://badgen.net/github/stars/awslabs/amazon-guardduty-tester) | [](https://badgen.net/github/contributors/awslabs/amazon-guardduty-tester) [](https://badgen.net/github/watchers/awslabs/amazon-guardduty-tester) [](https://badgen.net/github/last-commit/awslabs/amazon-guardduty-tester) [](https://badgen.net/github/open-issues/awslabs/amazon-guardduty-tester) [](https://badgen.net/github/closed-issues/awslabs/amazon-guardduty-tester) |
## 持续安全审计
| 名称 | 描述 | 流行度 | 元数据 |
| ---------- | :---------- | :----------: | :----------: |
| **[Security Monkey](https://github.com/Netflix/security_monkey)** | |[](https://badgen.net/github/stars/Netflix/security_monkey)| [](https://badgen.net/github/contributors/Netflix/security_monkey)[](https://badgen.net/github/watchers/Netflix/security_monkey)[](https://badgen.net/github/last-commit/Netflix/security_monkey) [](https://badgen.net/github/open-issues/Netflix/security_monkey) [](https://badgen.net/github/closed-issues/Netflix/security_monkey) |
| **[Krampus](https://github.com/sendgrid/krampus)** | |[](https://badgen.net/github/stars/sendgrid/krampus)| [](https://badgen.net/github/contributors/sendgrid/krampus)[](https://badgen.net/github/watchers/sendgrid/krampus)[](https://badgen.net/github/last-commit/sendgrid/krampus) [](https://badgen.net/github/open-issues/sendgrid/krampus) [](https://badgen.net/github/closed-issues/sendgrid/krampus) |
| **[Cloud Inquisitor](https://github.com/RiotGames/cloud-inquisitor)** | |[](https://badgen.net/github/stars/RiotGames/cloud-inquisitor)| [](https://badgen.net/github/contributors/RiotGames/cloud-inquisitor)[](https://badgen.net/github/watchers/RiotGames/cloud-inquisitor)[](https://badgen.net/github/last-commit/RiotGames/cloud-inquisitor) [](https://badgen.net/github/open-issues/RiotGames/cloud-inquisitor) [](https://badgen.net/github/closed-issues/RiotGames/cloud-inquisitor) |
| **[Disable keys after X days](https://github.com/te-papa/aws-key-disabler)** | |[](https://badgen.net/github/stars/te-papa/aws-key-disabler)| [](https://badgen.net/github/contributors/te-papa/aws-key-disabler)[](https://badgen.net/github/watchers/te-papa/aws-key-disabler)[](https://badgen.net/github/last-commit/te-papa/aws-key-disabler) [](https://badgen.net/github/open-issues/te-papa/aws-key-disabler) [](https://badgen.net/github/closed-issues/te-papa/aws-key-disabler) |
| **[Repokid Least Privilege](https://github.com/Netflix/repokid)** | |[](https://badgen.net/github/stars/Netflix/repokid)| [](https://badgen.net/github/contributors/Netflix/repokid)[](https://badgen.net/github/watchers/Netflix/repokid)[](https://badgen.net/github/last-commit/Netflix/repokid) [](https://badgen.net/github/open-issues/Netflix/repokid) [](https://badgen.net/github/closed-issues/Netflix/repokid) |
| **[Wazuh CloudTrail module](https://github.com/wazuh/wazuh)** | |[](https://badgen.net/github/stars/wazuh/wazuh)| [](https://badgen.net/github/contributors/wazuh/wazuh)[](https://badgen.net/github/watchers/wazuh/wazuh)[](https://badgen.net/github/last-commit/wazuh/wazuh) [](https://badgen.net/github/open-issues/wazuh/wazuh) [](https://badgen.net/github/closed-issues/wazuh/wazuh) |
| **[Hammer](https://github.com/dowjones/hammer)** | |[](https://badgen.net/github/stars/dowjones/hammer)| [](https://badgen.net/github/contributors/dowjones/hammer)[](https://badgen.net/github/watchers/dowjones/hammer)[](https://badgen.net/github/last-commit/dowjones/hammer) [](https://badgen.net/github/open-issues/dowjones/hammer) [](https://badgen.net/github/closed-issues/dowjones/hammer) |
| **[Streamalert](https://github.com/airbnb/streamalert)** | |[](https://badgen.net/github/stars/airbnb/streamalert)| [](https://badgen.net/github/contributors/airbnb/streamalert)[](https://badgen.net/github/watchers/airbnb/streamalert)[](https://badgen.net/github/last-commit/airbnb/streamalert) [](https://badgen.net/github/open-issues/airbnb/streamalert) [](https://badgen.net/github/closed-issues/airbnb/streamalert) |
| **[Billing Alerts CFN templates](https://github.com/btkrausen/AWS)** | |[](https://badgen.net/github/stars/btkrausen/AWS)| [](https://badgen.net/github/contributors/btkrausen/AWS)[](https://badgen.net/github/watchers/btkrausen/AWS)[](https://badgen.net/github/last-commit/btkrausen/AWS) [](https://badgen.net/github/open-issues/btkrausen/AWS) [](https://badgen.net/github/closed-issues/btkrausen/AWS) |
| **[Watchmen](https://github.com/iagcl/watchmen)** | AWS account compliance using centrally managed Config Rules |[](https://badgen.net/github/stars/iagcl/watchmen)| [](https://badgen.net/github/contributors/iagcl/watchmen)[](https://badgen.net/github/watchers/iagcl/watchmen)[](https://badgen.net/github/last-commit/iagcl/watchmen) [](https://badgen.net/github/open-issues/iagcl/watchmen) [](https://badgen.net/github/closed-issues/iagcl/watchmen) |
| **[ElectricEye](https://github.com/jonrau1/ElectricEye)** | Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability | [](https://badgen.net/github/stars/jonrau1/ElectricEye) | [](https://badgen.net/github/contributors/jonrau1/ElectricEye) [](https://badgen.net/github/watchers/jonrau1/ElectricEye) [](https://badgen.net/github/last-commit/jonrau1/ElectricEye) [](https://badgen.net/github/open-issues/jonrau1/ElectricEye) [](https://badgen.net/github/closed-issues/jonrau1/ElectricEye) |
| **[SyntheticSun](https://github.com/jonrau1/SyntheticSun)** | a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats | [](https://badgen.net/github/stars/jonrau1/SyntheticSun) | [](https://badgen.net/github/contributors/jonrau1/SyntheticSun) [](https://badgen.net/github/watchers/jonrau1/SyntheticSun) [](https://badgen.net/github/last-commit/jonrau1/SyntheticSun) [](https://badgen.net/github/open-issues/jonrau1/SyntheticSun) [](https://badgen.net/github/closed-issues/jonrau1/SyntheticSun) |
| **[CloudQuery](https://github.com/cloudquery/cloudquery/)** |query exposes your cloud configuration and metadata as sql tables, providing powerful analysis and monitoring for compliance and security |[](https://badgen.net/github/stars/cloudquery/cloudquery/)| [](https://badgen.net/github/contributors/cloudquery/cloudquery/)[](https://badgen.net/github/watchers/cloudquery/cloudquery/)[](https://badgen.net/github/last-commit/cloudquery/cloudquery/) [](https://badgen.net/github/open-issues/cloudquery/cloudquery/) [](https://badgen.net/github/closed-issues/cloudquery/cloudquery/) |
| **[PrismX](https://github.com/omaidf/PrismX)** | Cloud Security Dashboard for AWS - based on ScoutSuite | [](https://badgen.net/github/stars/omaidf/PrismX) | [](https://badgen.net/github/contributors/omaidf/PrismX) [](https://badgen.net/github/watchers/omaidf/PrismX) [](https://badgen.net/github/last-commit/omaidf/PrismX) [](https://badgen.net/github/open-issues/omaidf/PrismX) [](https://badgen.net/github/closed-issues/omaidf/PrismX) |
| **[Falco](https://github.com/falcosecurity/falco)** | Threat detection and response for containers, hosts, Kubernetes and the cloud | [](https://badgen.net/github/stars/falcosecurity/falco) | [](https://badgen.net/github/contributors/falcosecurity/falco) [](https://badgen.net/github/watchers/falcosecurity/falco) [](https://badgen.net/github/last-commit/falcosecurity/falco) [](https://badgen.net/github/open-issues/falcosecurity/falco) [](https://badgen.net/github/closed-issues/falcosecurity/falco) |
## 数字取证和事件响应
| Name | Description | Popularity | Metadata |
| ---------- | :---------- | :----------: | :----------: |
| **[AWS IR](https://github.com/ThreatResponse/aws_ir)** | AWS specific Incident Response and Forensics Tool |[](https://badgen.net/github/stars/ThreatResponse/aws_ir)| [](https://badgen.net/github/contributors/ThreatResponse/aws_ir)[](https://badgen.net/github/watchers/ThreatResponse/aws_ir)[](https://badgen.net/github/last-commit/ThreatResponse/aws_ir) [](https://badgen.net/github/open-issues/ThreatResponse/aws_ir) [](https://badgen.net/github/closed-issues/ThreatResponse/aws_ir) |
| **[Margaritashotgun](https://github.com/ThreatResponse/margaritashotgun)** | Linux memory remote acquisition tool |[](https://badgen.net/github/stars/ThreatResponse/margaritashotgun)| [](https://badgen.net/github/contributors/ThreatResponse/margaritashotgun)[](https://badgen.net/github/watchers/ThreatResponse/margaritashotgun)[](https://badgen.net/github/last-commit/ThreatResponse/margaritashotgun) [](https://badgen.net/github/open-issues/ThreatResponse/margaritashotgun) [](https://badgen.net/github/closed-issues/ThreatResponse/margaritashotgun) |
| **[Diffy](https://github.com/Netflix-Skunkworks/diffy)** | Triage tool used during cloud-centric security incidents |[](https://badgen.net/github/stars/Netflix-Skunkworks/diffy)| [](https://badgen.net/github/contributors/Netflix-Skunkworks/diffy)[](https://badgen.net/github/watchers/Netflix-Skunkworks/diffy)[](https://badgen.net/github/last-commit/Netflix-Skunkworks/diffy) [](https://badgen.net/github/open-issues/Netflix-Skunkworks/diffy) [](https://badgen.net/github/closed-issues/Netflix-Skunkworks/diffy) |
| **[AWS Security Automation](https://github.com/awslabs/aws-security-automation)** | AWS scripts and resources for DevSecOps and automated incident response |[](https://badgen.net/github/stars/awslabs/aws-security-automation)| [](https://badgen.net/github/contributors/awslabs/aws-security-automation)[](https://badgen.net/github/watchers/awslabs/aws-security-automation)[](https://badgen.net/github/last-commit/awslabs/aws-security-automation) [](https://badgen.net/github/open-issues/awslabs/aws-security-automation) [](https://badgen.net/github/closed-issues/awslabs/aws-security-automation) |
| **[GDPatrol](https://github.com/ansorren/GDPatrol)** | Automated Incident Response based off AWS GuardDuty findings |[](https://badgen.net/github/stars/ansorren/GDPatrol)| [](https://badgen.net/github/contributors/ansorren/GDPatrol)[](https://badgen.net/github/watchers/ansorren/GDPatrol)[](https://badgen.net/github/last-commit/ansorren/GDPatrol) [](https://badgen.net/github/open-issues/ansorren/GDPatrol) [](https://badgen.net/github/closed-issues/ansorren/GDPatrol) |
| **[AWSlog](https://github.com/jaksi/awslog)** | Show the history and changes between configuration versions of AWS resources using AWS Config |[](https://badgen.net/github/stars/jaksi/awslog)| [](https://badgen.net/github/contributors/jaksi/awslog)[](https://badgen.net/github/watchers/jaksi/awslog)[](httpsbadgen.net/github/last-commit/jaksi/awslog) [](https://badgen.net/github/open-issues/jaksi/awslog) [](https://badgen.net/github/closed-issues/jaksi/awslog) |
| **[DataCop](https://github.com/damienjburks/DataCop)** | Automated IR process that mitigates vulnerable AWS S3 buckets that are defined by AWS Macie results. | [](https://badgen.net/github/stars/damienjburks/datacop)| [](https://badgen.net/github/contributors/damienjburks/datacop) [](https://badgen.net/github/watchers/damienjburks/datacop) [](https://badgen.net/github/last-commit/damienjburks/datacop) [](https://badgen.net/github/open-issues/damienjburks/datacop) [](https://badgen.net/github/closed-issues/damienjburks/datacop) |
| **[AWS_Responder](https://github.com/prolsen/aws_responder)** | AWS Digital Forensic and Incident Response (DFIR) Response Python Scripts |[](https://badgen.net/github/stars/prolsen/aws_responder)| [](https://badgen.net/github/contributors/prolsen/aws_responder)[](https://badgen.net/github/watchers/prolsen/aws_responder)[](https://badgen.net/github/last-commit/prolsen/aws_responder) [](https://badgen.net/github/open-issues/prolsen/aws_responder) [](https://badgen.net/github/closed-issues/prolsen/aws_responder) |
| **[SSM-Acquire](https://github.com/mozilla/ssm-acquire)** | A python module for orchestrating content acquisitions and analysis via Amazon SSM |[](https://badgen.net/github/stars/mozilla/ssm-acquire)| [](https://badgen.net/github/contributors/mozilla/ssm-acquire)[](https://badgen.net/github/watchers/mozilla/ssm-acquire)[](https://badgen.net/github/last-commit/mozilla/ssm-acquire) [](https://badgen.net/github/open-issues/mozilla/ssm-acquire) [](https://badgen.net/github/closed-issues/mozilla/ssm-acquire) |
| **[cloudtrail-partitioner](https://github.com/duo-labs/cloudtrail-partitioner)** | This project sets up partitioned Athena tables for your CloudTrail logs and updates the partitions nightly. Makes CloudTrail logs queries easier. | [](https://badgen.net/github/stars/duo-labs/cloudtrail-partitioner)| [](https://badgen.net/github/contributors/duo-labs/cloudtrail-partitioner)[](https://badgen.net/github/watchers/duo-labs/cloudtrail-partitioner)[](https://badgen.net/github/last-commit/duo-labs/cloudtrail-partitioner) [](https://badgen.net/github/open-issues/duo-labs/cloudtrail-partitioner) [](https://badgen.net/github/closed-issues/duo-labs/cloudtrail-partitioner) |
| **[fargate-ir](https://github.com/andrewkrug/fargate-ir)** | Proof of concept incident response demo using SSM and AWS Fargate. |[](https://badgen.net/github/stars/andrewkrug/fargate-ir)| [](https://badgen.net/github/contributors/andrewkrug/fargate-ir)[](https://badgen.net/github/watchers/andrewkrug/fargate-ir)[](https://badgen.net/github/last-commit/andrewkrug/fargate-ir) [](https://badgen.net/github/open-issues/andrewkrug/fargate-ir) [](https://badgen.net/github/closed-issues/andrewkrug/fargate-ir) |
| **[aws-logsearch](https://github.com/endgameinc/aws-logsearch)** | Search AWS CloudWatch logs all at once on the command line. | [](https://badgen.net/github/stars/endgameinc/aws-logsearch) | [](https://badgen.net/github/contributors/endgameinc/aws-logsearch) [](https://badgen.net/github/watchers/endgameinc/aws-logsearch) [](https://badgen.net/github/last-commit/endgameinc/aws-logsearch) [](https://badgen.net/github/open-issues/endgameinc/aws-logsearch) [](https://badgen.net/github/closed-issues/endgameinc/aws-logsearch) |
| **[Varna](https://github.com/endgameinc/varna)** | Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL) | [](https://badgen.net/github/stars/endgameinc/varna) | [](https://badgen.net/github/contributors/endgameinc/varna) [](https://badgen.net/github/watchers/endgameinc/varna) [](https://badgen.net/github/last-commit/endgameinc/varna) [](https://badgen.net/github/open-issues/endgameinc/varna) [](https://badgen.net/github/closed-issues/endgameinc/varna) |
| **[aws-auto-remediate](https://github.com/servian/aws-auto-remediate)** | Open source application to instantly remediate common security issues through the use of AWS Config | [](https://badgen.net/github/stars/servian/aws-auto-remediate) | [](https://badgen.net/github/contributors/servian/aws-auto-remediate) [](https://badgen.net/github/watchers/servian/aws-auto-remediate) [](https://badgen.net/github/last-commit/servian/aws-auto-remediate) [](https://badgen.net/github/open-issues/servian/aws-auto-remediate) [](https://badgen.net/github/closed-issues/servian/aws-auto-remediate) |
| **panther-labs](https://github.com/panther-labs/panther-analysis)** | Detect threats with log data and improve cloud security posture | [](https://badgen.net/github/stars/panther-labs/panther-analysis) | [](https://badgen.net/github/contributors/panther-labs/panther-analysis) [](https://badgen.net/github/watchers/panther-labs/panther-analysis) [](https://badgen.net/github/last-commit/panther-labs/panther-analysis) [](https://badgen.net/github/open-issues/panther-labs/panther-analysis) [](https://badgen.net/github/closed-issues/panther-labs/panther-analysis) |
| **[aws-incident-response](https://github.com/easttimor/aws-incident-response)** | This page is a collection of useful things to look for in CloudTrail using Athena for AWS incident response | [](https://badgen.net/github/stars/easttimor/aws-incident-response) | [](https://badgen.net/github/contributors/easttimor/aws-incident-response)[](https://badgen.net/github/watchers/easttimor/aws-incident-response)[](https://badgen.net/github/last-commit/easttimor/aws-incident-response) [](https://badgen.net/github/open-issues/easttimor/aws-incident-response) [](https://badgen.net/github/closed-issues/easttimor/aws-incident-response) |
| **[cloud-forensics-utils](https://github.com/google/cloud-forensics-utils)** | Python library to carry out DFIR analysis on the Cloud | [](https://badgen.net/github/stars/google/cloud-forensics-utils) | [](https://badgen.net/github/contributors/google/cloud-forensics-utils) [](https://badgen.net/github/watchers/google/cloud-forensics-utils) [](https://badgen.net/github/last-commit/google/cloud-forensics-utils) [](https://badgen.net/github/open-issues/google/cloud-forensics-utils) [](https://badgen.net/github/closed-issues/google/cloud-forensics-utils) |
| **[aws-fast-fixes](https://github.com/WarnerMedia/aws-fast-fixes)** | Scripts to quickly fix security and compliance issues | [](https://badgen.net/github/stars/WarnerMedia/aws-fast-fixes) | [](https://badgen.net/github/contributors/WarnerMedia/aws-fast-fixes)[](https://badgen.net/github/watchers/WarnerMedia/aws-fast-fixes)[](https://badgen.net/github/last-commit/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/open-issues/WarnerMedia/aws-fast-fixes) [](https://badgen.net/github/closed-issues/WarnerMedia/aws-fast-fixes) |
## 开发安全
| Name | Description | Popularity | Metadata |
| ---------- | :---------- | :----------: | :----------: |
| **[Automated Security Helper (ASH)](https://github.com/aws-samples/automated-security-helper)** | ASH is a one stop shop for code security scans, and does not require any installation. It will identify the relevant frameworks, and download the relevant, up to date tools. ASH is running on isolated Docker containers, keeping the user environment clean, with a single aggregated report. The following frameworks are supported: Git, Python, Javascript, Cloudformation, Terraform and Jupyter notebook. |[](https://badgen.net/github/stars/aws-samples/automated-security-helper)| [](https://badgen.net/github/contributors/aws-samples/automated-security-helper)[](https://badgen.net/github/watchers/aws-samples/automated-security-helper)[](https://badgen.net/github/last-commit/aws-samples/automated-security-helper) [](https://badgen.net/github/open-issues/aws-samples/automated-security-helper) [](https://badgen.net/github/closed-issues/aws-samples/automated-security-helper) |
| **[CFN NAG](https://github.com/stelligent/cfn_nag)** | CloudFormation security test (Ruby) |[](https://badgen.net/github/stars/stelligent/cfn_nag)| [](https://badgen.net/github/contributors/stelligent/cfn_nag)[](https://badgen.net/github/watchers/stelligent/cfn_nag)[](https://badgen.net/github/last-commit/stelligent/cfn_nag) [](https://badgen.net/github/open-issues/stelligent/cfn_nag) [](https://badgen.net/github/closed-issues/stelligent/cfn_nag) |
| **[Git-secrets](https://github.com/awslabs/git-secrets)** | |[](https://badgen.net/github/stars/awslabs/git-secrets)| [](https://badgen.net/github/contributors/awslabs/git-secrets)[](https://badgen.net/github/watchers/awslabs/git-secrets)[](https://badgen.net/github/last-commit/awslabs/git-secrets) [](https://badgen.net/github/open-issues/awslabs/git-secrets) [](https://badgen.net/github/closed-issues/awslabs/git-secrets) |
| **[Repository of sample Custom Rules for AWS Config](https://github.com/awslabs/aws-config-rules)** | |[](https://badgen.net/github/stars/awslabs/aws-config-rules)| [](https://badgen.net/github/contributors/awslabs/aws-config-rules)[](https://badgen.net/github/watchers/awslabs/aws-config-rules)[](https://badgen.net/github/last-commit/awslabs/aws-config-rules) [](https://badgen.net/github/open-issues/awslabs/aws-config-rules) [](https://badgen.net/github/closed-issues/awslabs/aws-config-rules) |
| **[CFripper](https://github.com/Skyscanner/cfripper)** | "Lambda function to ""rip apart"" a CloudFormation template and check it for security." |[](https://badgen.net/github/stars/Skyscanner/cfripper)| [](https://badgen.net/github/contributors/Skyscanner/cfripper)[](https://badgen.net/github/watchers/Skyscanner/cfripper)[](https://badgen.net/github/last-commit/Skyscanner/cfripper) [](https://badgen.net/github/open-issues/Skyscanner/cfripper) [](https://badgen.net/github/closed-issues/Skyscanner/cfripper) |
| **[Assume](https://github.com/SanderKnape/assume)** | A simple CLI utility that makes it easier to switch between different AWS roles |[](https://badgen.net/github/stars/SanderKnape/assume)| [](https://badgen.net/github/contributors/SanderKnape/assume)[](https://badgen.net/github/watchers/SanderKnape/assume)[](https://badgen.net/github/last-commit/SanderKnape/assume) [](https://badgen.net/github/open-issues/SanderKnape/assume) [](https://badgen.net/github/closed-issues/SanderKnape/assume) |
| **[Terrascan](https://github.com/cesar-rodriguez/terrascan)** | A collection of security and best practice tests for static code analysis of terraform templates using terraform_validate |[](https://badgen.net/github/stars/cesar-rodriguez/terrascan)| [](https://badgen.net/github/contributors/cesar-rodriguez/terrascan)[](https://badgen.net/github/watchers/cesar-rodriguez/terrascan)[](https://badgen.net/github/last-commit/cesar-rodriguez/terrascan) [](https://badgen.net/github/open-issues/cesar-rodriguez/terrascan) [](https://badgen.net/github/closed-issues/cesar-rodriguez/terrascan) |
| **[tfsec](https://github.com/liamg/tfsec)** | Provides static analysis of your terraform templates to spot potential security issues |[](https://badgen.net/github/stars/liamg/tfsec)| [](https://badgen.net/github/contributors/liamg/tfsec)[](https://badgen.net/github/watchers/liamg/tfsec)[](https://badgen.net/github/last-commit/liamg/tfsec) [](https://badgen.net/github/open-issues/liamg/tfsec) [](https://badgen.net/github/closed-issues/liamg/tfsec) |
| **[Checkov](https://github.com/bridgecrewio/checkov)** | Terraform, Cloudformation and Kubernetes static analysis written in python |[](https://badgen.net/github/stars/bridgecrewio/checkov)| [](https://badgen.net/github/contributors/bridgecrewio/checkov)[](https://badgen.net/github/watchers/bridgecrewio/checkov)[](https://badgen.net/github/last-commit/bridgecrewio/checkov) [](https://badgen.net/github/open-issues/bridgecrewio/checkov) [](https://badgen.net/github/closed-issues/bridgecrewio/checkov) |
| **[Yor](https://github.com/bridgecrewio/yor)** | Automatically tag and trace infrastructure as code frameworks (Terraform, Cloudformation and Serverless) |[](https://badgen.net/github/stars/bridgecrewio/yor)| [](https://badgen.net/github/contributors/bridgecrewio/yor)[](https://badgen.net/github/watchers/bridgecrewio/yor)[](https://badgen.net/github/last-commit/bridgecrewio/yor) [](https://badgen.net/github/open-issues/bridgecrewio/yor) [](https://badgen.net/github/closed-issues/bridgecrewio/yor) |
| **[pytest-services](https://github.com/mozilla-services/pytest-services)** | Unit testing framework for test driven security of AWS configurations and more |[](https://badgen.net/github/stars/mozilla-services/pytest-services)| [](https://badgen.net/github/contributors/mozilla-services/pytest-services)[](https://badgen.net/github/watchers/mozilla-services/pytest-services)[](https://badgen.net/github/last-commit/mozilla-services/pytest-services) [](https://badgen.net/github/open-issues/mozilla-services/pytest-services) [](https://badgen.net/github/closed-issues/mozilla-services/pytest-services) |
| **[IAM Least-Privileged Role Generator](https://github.com/puresec/serverless-puresec-cli)** | A Serverless framework plugin that statically analyzes AWS Lambda function code and automagically generates least-privileged IAM roles. |[](https://badgen.net/github/stars/puresec/serverless-puresec-cli)| [](https://badgen.net/github/contributors/puresec/serverless-puresec-cli)[](https://badgen.net/github/watchers/puresec/serverless-puresec-cli)[](https://badgen.net/github/last-commit/puresec/serverless-puresec-cli) [](https://badgen.net/github/open-issues/puresec/serverless-puresec-cli) [](https://badgen.net/github/closed-issues/puresec/serverless-puresec-cli) |
| **[AWS Vault](https://github.com/99designs/aws-vault)** | A vault for securely storing and accessing AWS credentials in development environments |[](https://badgen.net/github/stars/99designs/aws-vault)| [](https://badgen.net/github/contributors/99designs/aws-vault)[](https://badgen.net/github/watchers/99designs/aws-vault)[](https://badgen.net/github/last-commit/99designs-vault) [](https://badgen.net/github/open-issues/99designs/aws-vault) [](https://badgen.net/github/closed-issues/99designs/aws-vault) |
| **[AWS Service Control Policies](https://github.com/jchrisfarris/aws-service-control-policies)** | Collection of semi-useful Service Control Policies and scripts to manage them |[](https://badgen.net/github/stars/jchrisfarris/aws-service-control-policies)| [](https://badgen.net/github/contributors/jchrisfarris/aws-service-control-policies)[](https://badgen.net/github/watchers/jchrisfarris/aws-service-control-policies)[](https://badgen.net/github/last-commit/jchrisfarris/aws-service-control-policies) [](https://badgen.net/github/open-issues/jchrisfarris/aws-service-control-policies) [](https://badgen.net/github/closed-issues/jchrisfarris/aws-service-control-policies) |
| **[Terraform-compliance](https://github.com/eerkunt/terraform-compliance)** | A lightweight security focused BDD test framework against terraform (with helpful code for AWS) |[](https://badgen.net/github/stars/eerkunt/terraform-compliance)| [](https://badgen.net/github/contributors/eerkunt/terraform-compliance)[](https://badgen.net/github/watchers/eerkunt/terraform-compliance)[](https://badgen.net/github/last-commit/eerkunt/terraform-compliance) [](https://badgen.net/github/open-issues/eerkunt/terraform-compliance) [](https://badgen.net/github/closed-issues/eerkunt/terraform-compliance) |
| **[Get a List of AWS Managed Policies](https://github.com/RyPeck/aws_managed_policies)** | a way to get a list of all AWS managed policies |[](https://badgen.net/github/stars/RyPeck/aws_managed_policies)| [](https://badgen.net/github/contributors/RyPeck/aws_managed_policies)[](https://badgen.net/github/watchers/RyPeck/aws_managed_policies)[](https://badgen.net/github/last-commit/RyPeck/aws_managed_policies) [](https://badgen.net/github/open-issues/RyPeck/aws_managed_policies) [](https://badgen.net/github/closed-issues/RyPeck/aws_managed_policies) |
| **[Parliament](https://github.com/duo-labs/parliament)** | AWS IAM linting library |[](https://badgen.net/github/stars/duo-labs/parliament)| [](https://badgen.net/github/contributors/duo-labs/parliament)[](https://badgen.net/github/watchers/duo-labs/parliament)[](https://badgen.net/github/last-commit/duo-labs/parliament) [](https://badgen.net/github/open-issues/duo-labs/parliament) [](https://badgen.net/github/closed-issues/duo-labs/parliament) |
| **[AWS-ComplianceMachineDontStop](https://github.com/jonrau1/AWS-ComplianceMachineDontStop)** | Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security Identity & Compliance Services to Support your AWS Account Security Posture |[](https://badgen.net/github/stars/jonrau1/AWS-ComplianceMachineDontStop)| [](https://badgen.net/github/contributors/jonrau1/AWS-ComplianceMachineDontStop)[](https://badgen.net/github/watchers/jonrau1/AWS-ComplianceMachineDontStop)[](https://badgen.net/github/last-commit/jonrau1/AWS-ComplianceMachineDontStop) [](https://badgen.net/github/open-issues/jonrau1/AWS-ComplianceMachineDontStop) [](https://badgen.net/github/closed-issues/jonrau1/AWS-ComplianceMachineDontStop) |
| **[detect-secrets](https://github.com/Yelp/detect-secrets)** | An enterprise friendly way of detecting and preventing secrets in code. |[](https://badgen.net/github/stars/yelp/detect-secrets)| [](https://badgen.net/github/contributors/yelp/detect-secrets)[](https://badgen.net/github/watchers/yelp/detect-secrets)[](https://badgen.net/github/last-commit/yelp/detect-secrets) [](https://badgen.net/github/open-issues/yelp/detect-secrets) [](https://badgen.net/github/closed-issues/yelp/detect-secrets) |
| **[tf-parliament](https://github.com/rdkls/tf-parliament)** | Run Parliament AWS IAM Checker on Terraform Files |[](https://badgen.net/github/stars/rdkls/tf-parliament)| [](https://badgen.net/github/contributors/rdkls/tf-parliament)[](https://badgen.net/github/watchers/rdkls/tf-parliament)[](https://badgen.net/github/last-commit/rdkls/tf-parliament) [](https://badgen.net/github/open-issues/rdkls/tf-parliament) [](https://badgen.net/github/closed-issues/rdkls/tf-parliament) |
| **[aws-gate](https://github.com/xen0l/aws-gate)** | Better AWS SSM Session manager CLI client | [](https://badgen.net/github/stars/xen0l/aws-gate)| [](https://badgen.net/github/contributors/xen0l/aws-gate) [](https://badgen.net/github/watchers/xen0l/aws-gate) [](https://badgen.net/github/last-commit/xen0l/aws-gate) [](https://badgen.net/github/open-issues/xen0l/aws-gate) [](https://badgen.net/github/closed-issues/xen0l/aws-gate) |
| **[iam-lint]( )** | Github action for linting AWS IAM policy documents for correctness and possible security issues |[](https://badgen.net/github/stars/xen0l/iam-lint) | [](https://badgen.net/github/contributors/xen0l/iam-lint) [](https://badgen.net/github/watchers/xen0l/iam-lint) [](https://badgen.net/github/last-commit/xen0l/iam-lint) [](https://badgen.net/github/open-issues/xen0l/iam-lint) [](https://badgen.net/github/closed-issues/xen0l/iam-lint) |
| **[Regula](https://github.com/fugue/regula)** | Regula checks Terraform for AWS security and compliance using Open Policy Agent/Rego | [](https://badgen.net/github/stars/fugue/regula) | [](https://badgen.net/github/contributors/fugue/regula) [](https://badgen.net/github/watchers/fugue/regula) [](https://badgen.net/github/last-commit/fugue/regula) [](https://badgen.net/github/open-issues/fugue/regula) [](https://badgen.net/github/closed-issues/fugue/regula) |
| **[whispers](https://github.com/Skyscanner/whispers)** | Identify hardcoded secrets and dangerous behaviours | [](https://badgen.net/github/stars/Skyscanner/whispers) | [](https://badgen.net/github/contributors/Skyscanner/whispers) [](https://badgen.net/github/watchers/Skyscanner/whispers) [](https://badgen.net/github/last-commit/Skyscanner/whispers) [](https://badgen.net/github/open-issues/Skyscanner/whispers) [](https://badgen.net/github/closed-issues/Skyscanner/whispers) |
| **[cloudformation-guard](https://github.com/aws-cloudformation/cloudformation-guard)** | A set of tools to check AWS CloudFormation templates for policy compliance using a simple, policy-as-code, declarative syntax. | [](https://badgen.net/github/stars/aws-cloudformation/cloudformation-guard) | [](https://badgen.net/github/contributors/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/watchers/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/last-commit/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/open-issues/aws-cloudformation/cloudformation-guard) [](https://badgen.net/github/closed-issues/aws-cloudformation/cloudformation-guard) |
| **[IAMFinder](https://github.com/prisma-cloud/IAMFinder)** | Enumerates and finds users and IAM roles in a target AWS account | [](https://badgen.net/github/stars/prisma-cloud/IAMFinder)| [](https://badgen.net/github/contributors/prisma-cloud/IAMFinder) [](https://badgen.net/github/watchers/prisma-cloud/IAMFinder) [](https://badgen.net/github/last-commit/prisma-cloud/IAMFinder) [](https://badgen.net/github/open-issues/prisma-cloud/IAMFinder) [](https://badgen.net/github/closed-issues/prisma-cloud/IAMFinder) |
| **[iamlive](https://github.com/iann0036/iamlive)** | Generate a basic IAM policy from AWS client-side monitoring (CSM) | [](https://badgen.net/github/stars/iann0036/iamlive) | [](https://badgen.net/github/contributors/iann0036/iamlive) [](https://badgen.net/github/watchers/iann0036/iamlive)[](https://badgen.net/github/last-commit/iann0036/iamlive) [](https://badgen.net/github/open-issues/iann0036/iamlive) [](https://badgen.net/github/closed-issues/iann0036/iamlive) |
| **[aws-allowlister](https://github.com/salesforce/aws-allowlister)** | Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks. | [](https://badgen.net/github/stars/salesforce/aws-allowlister) | [](https://badgen.net/github/contributors/salesforce/aws-allowlister)[](https://badgen.net/github/watchers/salesforce/aws-allowlister)[](https://badgen.net/github/last-commit/salesforce/aws-allowlister) [](https://badgen.net/github/open-issues/salesforce/aws-allowlister) [](https://badgen.net/github/closed-issues/salesforce/aws-allowlister) |
| **[Leapp](https://github.com/Noovolari/leapp)** | Cross-platform app for managing AWS credentials programmatically, based on Electron |[](https://badgen.net/github/stars/Noovolari/leapp)| [](https://badgen.net/github/contributors/Noovolari/leapp)[](https://badgen.net/github/watchers/Noovolari/leapp)[](https://badgen.net/github/last-commit/Noovolari/leapp) [](https://badgen.net/github/open-issues/Noovolari/leapp) [](https://badgen.net/github/closed-issues/Noovolari/leapp) |
| **[KICS](https://github.com/Checkmarx/kics)** | Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code |[](https://badgen.net/github/stars/marx/kics)| [](https://badgen.net/github/contributors/Checkmarx/kics)[](https://badgen.net/github/watchers/Checkmarx/kics)[](https://badgen.net/github/last-commit/Checkmarx/kics) [](https://badgen.net/github/open-issues/Checkmarx/kics) [](https://badgen.net/github/closed-issues/Checkmarx/kics) |
| **[SecurityHub CIS Compliance Automator](https://github.com/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)** | Automatically configure your AWS Account to meet 95% of the 200+ controls for CIS Compliance, PCI DSS Compliance and AWS Security Best Practice |[](https://badgen.net/github/stars/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)| [](https://badgen.net/github/contributors/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)[](https://badgen.net/github/watchers/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation)[](https://badgen.net/github/last-commit/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) [](https://badgen.net/github/open-issues/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) [](https://badgen.net/github/closed-issues/NickTheSecurityDude/AWS-SecurityHub-CIS-Compliance-Automation) |
| **[SCPkit](https://github.com/aquia-inc/scpkit)** | A SCP management tool that helps condense policies |[](https://badgen.net/github/stars/aquia-inc/scpkit)| [](https://badgen.net/github/contributors/aquia-inc/scpkit)[](https://badgen.net/github/watchers/aquia-inc/scpkit)[](https://badgen.net/github/last-commit/aquia-inc/scpkit) [](https://badgen.net/github/open-issues/aquia-inc/scpkit) [](https://badgen.net/github/closed-issues/aquia-inc/scpkit) |
| **[Codemodder](https://github.com/pixee/codemodder-java)** | A pluggable framework for building expressive codemods. Use Codemodder when you need more than a linter or code formatting tool. Use it to fix non-trivial security issues and other code quality problems |[](https://badgen.net/github/stars/pixee/codemodder-java) |[](https://badgen.net/github/stars/pixee/codemodder-java) [](https://badgen.net/github/watchers/pixee/codemodder-java) [](https://badgen.net/github/last-commit/pixee/codemodder-java) [](https://badgen.net/github/open-issues/pixee/codemodder-java) [](https://badgen.net/github/closed-issues/pixee/codemodder-java) |
## S3 存储桶审计
| Name | Description | Popularity | Metadata |
| ---------- | :---------- | :----------: | :----------: |
| **[mass3](https://github.com/smiegles/mass3)** | enumerate through a pre-compiled list of AWS S3 buckets using DNS instead of HTTP with a list of DNS resolvers and multi-threading |[](https://badgen.net/github/stars/smiegles/mass3)| [](https://badgen.net/github/contributors/smiegles/mass3)[](https://badgen.net/github/watchers/smiegles/mass3)[](https://badgen.net/github/last-commit/smiegles/mass3) [](https://badgen.net/github/open-issues/smiegles/mass3) [](https://badgen.net/github/closed-issues/smiegles/mass3) |
| **[teh_s3_bucketeers](https://github.com/tomdev/teh_s3_bucketeers)** | |[](https://badgen.net/github/stars/tomdev/teh_s3_bucketeers)| [](https://badgen.net/github/contributors/tomdev/teh_s3_bucketeers)[](https://badgen.net/github/watchers/tomdev/teh_s3_bucketeers)[](https://badgen.net/github/last-commit/tomdev/teh_s3_bucketeers) [](https://badgen.net/github/open-issues/tomdev/teh_s3_bucketeers) [](https://badgen.net/github/closed-issues/tomdev/teh_s3_bucketeers) |
| **[bucket-stream](https://github.com/eth0izzle/bucket-stream)** | Find interesting Amazon S3 Buckets by watching certificate transparency logs |[](https://badgen.net/github/stars/eth0izzle/bucket-stream)| [](https://badgen.net/github/contributors/eth0izzle/bucket-stream)[](https://badgen.net/github/watchers/eth0izzle/bucket-stream)[](https://badgen.net/github/last-commit/eth0izzle/bucket-stream) [](https://badgen.net/github/open-issues/eth0izzle/bucket-stream) [](https://badgen.net/github/closed-issues/eth0izzle/bucket-stream) |
| **[s3-buckets-finder](https://github.com/gwen001/s3-buckets-finder)** | brute force Amazon S3 bucket |[](https://badgen.net/github/stars/gwen001/s3-buckets-finder)| [](https://badgen.net/github/contributors/gwen001/s3-buckets-finder)[](https://badgen.net/github/watchers/gwen001/s3-buckets-finder)[](https://badgen.net/github/last-commit/gwen001/s3-buckets-finder) [](https://badgen.net/github/open-issues/gwen001/s3-buckets-finder) [](://badgen.net/github/closed-issues/gwen001/s3-buckets-finder) |
| **[s3find](https://github.com/aaparmeggiani/s3find)** | find S3 public buckets |[](https://badgen.net/github/stars/aaparmeggiani/s3find)| [](https://badgen.net/github/contributors/aaparmeggiani/s3find)[](https://badgen.net/github/watchers/aaparmeggiani/s3find)[](https://badgen.net/github/last-commit/aaparmeggiani/s3find) [](https://badgen.net/github/open-issues/aaparmeggiani/s3find) [](https://badgen.net/github/closed-issues/aaparmeggiani/s3find) |
| **[slurp-robbie](https://github.com/random-robbie/slurp)** | Enumerate S3 buckets via certstream, domain, or keywords |[](https://badgen.net/github/stars/random-robbie/slurp)| [](https://badgen.net/github/contributors/random-robbie/slurp)[](https://badgen.net/github/watchers/random-robbie/slurp)[](https://badgen.net/github/last-commit/random-robbie/slurp) [](https://badgen.net/github/open-issues/random-robbie/slurp) [](https://badgen.net/github/closed-issues/random-robbie/slurp) |
| **[s3-inspector](https://github.com/clario-tech/s3-inspector)** | check AWS S3 bucket permissions |[](https://badgen.net/github/stars/clario-tech/s3-inspector)| [](https://badgen.net/github/contributors/clario-tech/s3-inspector)[](https://badgen.net/github/watchers/clario-tech/s3-inspector)[](https://badgen.net/github/last-commit/clario-tech/s3-inspector) [](https://badgen.net/github/open-issues/clario-tech/s3-inspector) [](https://badgen.net/github/closed-issues/clario-tech/s3-inspector) |
| **[s3-fuzzer](https://github.com/pbnj/s3-fuzzer)** | |[](https://badgen.net/github/stars/pbnj/s3-fuzzer)| [](https://badgen.net/github/contributors/pbnj/s3-fuzzer)[](https://badgen.net/github/watchers/pbnj/s3-fuzzer)[](https://badgen.net/github/last-commit/pbnj/s3-fuzzer) [](https://badgen.net/github/open-issues/pbnj/s3-fuzzer) [](https://badgen.net/github/closed-issues/pbnj/s3-fuzzer) |
| **[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)** | Look For Interesting Files in S3 Buckets |[](https://badgen.net/github/stars/jordanpotti/AWSBucketDump)| [](https://badgen.net/github/contributors/jordanpotti/AWSBucketDump)[](https://badgen.net/github/watchers/jordanpotti/AWSBucketDump)[](https://badgen.net/github/last-commit/jordanpotti/AWSBucketDump) [](https://badgen.net/github/open-issues/jordanpotti/AWSBucketDump) [](https://badgen.net/github/closed-issues/jordanpotti/AWSBucketDump) |
| **[s3scan](https://github.com/bear/s3scan)** | scan s3 buckets for security issues |[](https://badgen.net/github/stars/bear/s3scan)| [](https://badgen.net/github/contributors/bear/s3scan)[](https://badgen.net/github/watchers/bear/s3scan)[](https://badgen.net/github/last-commit/bear/s3scan) [](https://badgen.net/github/open-issues/bear/s3scan) [](https://badgen.net/github/closed-issues/bear/s3scan) |
| **[S3Scanner](https://github.com/sa7mon/S3Scanner)** | Scan for open AWS S3 buckets and dump the contents |[](https://badgen.net/github/stars/sa7mon/S3Scanner)| [](https://badgen.net/github/contributors/sa7mon/S3Scanner)[](https://badgen.net/github/watchers/sa7mon/S3Scanner)[](https://badgen.net/github/last-commit/sa7mon/S3Scanner) [](https://badgen.net/github/open-issues/sa7mon/S3Scanner) [](https://badgen.net/github/closed-issues/sa7mon/S3Scanner) |
| **[s3finder](https://github.com/magisterquis/s3finder)** | open S3 bucket finder |[](https://badgen.net/github/stars/magisterquis/s3finder)| [](https://badgen.net/github/contributors/magisterquis/s3finder)[](https://badgen.net/github/watchers/magisterquis/s3finder)[](https://badgen.net/github/last-commit/magisterquis/s3finder) [](https://badgen.net/github/open-issues/magisterquis/s3finder) [](https://badgen.net/github/closed-issues/magisterquis/s3finder) |
| **[S3Scan](https://github.com/abhn/S3Scan)** | spider a website and find publicly open S3 buckets |[](https://badgen.net/github/stars/abhn/S3Scan)| [](https://badgen.net/github/contributors/abhn/S3Scan)[](https://badgen/github/watchers/abhn/S3Scan)[](https://badgen.net/github/last-commit/abhn/S3Scan) [](https://badgen.net/github/open-issues/abhn/S3Scan) [](https://badgen.net/github/closed-issues/abhn/S3Scan) |
| **[s3-meta](https://github.com/whitfin/s3-meta)** | Gather metadata about your S3 buckets |[](https://badgen.net/github/stars/whitfin/s3-meta)| [](https://badgen.net/github/contributors/whitfin/s3-meta)[](https://badgen.net/github/watchers/whitfin/s3-meta)[](https://badgen.net/github/last-commit/whitfin/s3-meta) [](https://badgen.net/github/open-issues/whitfin/s3-meta) [](https://badgen.net/github/closed-issues/whitfin/s3-meta) |
| **[s3-utils](https://github.com/whitfin/s3-utils)** | Utilities and tools based around Amazon S3 to provide convenience APIs in a CLI |[](https://badgen.net/github/stars/whitfin/s3-utils)| [](https://badgen.net/github/contributors/whitfin/s3-utils)[](https://badgen.net/github/watchers/whitfin/s3-utils)[](https://badgen.net/github/last-commit/whitfin/s3-utils) [](https://badgen.net/github/open-issues/whitfin/s3-utils) [](https://badgen.net/github/closed-issues/whitfin/s3-utils) |
| **[S3PublicBucketsCheck](https://github.com/vr00n/Amazon-Web-Shenanigans)** | A lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is created |[](https://badgen.net/github/stars/vr00n/Amazon-Web-Shenanigans)| [](https://badgen.net/github/contributors/vr00n/Amazon-Web-Shenanigans)[](https://badgen.net/github/watchers/vr00n/Amazon-Web-Shenanigans)[](https://badgen.net/github/last-commit/vr00n/Amazon-Web-Shenanigans) [](https://badgen.net/github/open-issues/vr00n/Amazon-Web-Shenanigans) [](https://badgen.net/github/closed-issues/vr00n/Amazon-Web-Shenanigans) |
| **[bucket_finder](https://github.com/FishermansEnemy/bucket_finder)** | Amazon bucket brute force tool |[](https://badgen.net/github/stars/FishermansEnemy/bucket_finder)| [](https://badgen.net/github/contributors/FishermansEnemy/bucket_finder)[](https://badgen.net/github/watchers/FishermansEnemy/bucket_finder)[](https://badgen.net/github/last-commit/FishermansEnemy/bucket_finder) [](https://badgen.net/github/open-issues/FishermansEnemy/bucket_finder) [](https://badgen.net/github/closed-issues/FishermansEnemy/bucket_finder) |
| **[inSp3ctor](https://github.com/brianwarehime/inSp3ctor)** | AWS S3 Bucket/Object Finder |[](https://badgen.net/github/stars/brianwarehime/inSp3ctor)| [](https://badgen.net/github/contributors/brianwarehime/inSp3ctor)[](https://badgen.net/github/watchers/brianwarehime/inSp3ctor)[](https://badgen.net/github/last-commit/brianwarehime/inSp3ctor) [](https://badgen.net/github/open-issues/brianwarehime/inSp3ctor) [](https://badgen.net/github/closed-issues/brianwarehime/inSp3ctor) |
| **[bucketcat](https://github.com/Atticuss/bucketcat)** | Brute-forces objects within a given bucket using Hashcat mask-like syntax |[](https://badgen.net/github/stars/Atticuss/bucketcat)| [](https://badgen.net/github/contributors/Atticuss/bucketcat)[](https://badgen.net/github/watchers/Atticuss/bucketcat)[](https://badgen.net/github/last-commit/Atticuss/bucketcat) [](https://badgen.net/github/open-issues/Atticuss/bucketcat) [](https://badgen.net/github/closed-issues/Atticuss/bucketcat) |
| **[aws-s3-data-finder](https://github.com/Ucnt/aws-s3-data-finder)** | AWS S3 Sensitive Data Search |[](https://badgen.net/github/stars/Ucnt/aws-s3-data-finder)| [](https://badgen.net/github/contributors/Ucnt/aws-s3-data-finder)[](https://badgen.net/github/watchers/Ucnt/aws-s3-data-finder)[](https://badgen.net/github/last-commit/Ucnt/aws-s3-data-finder) [](https://badgen.net/github/open-issues/Ucnt/aws-s3-data-finder) [](https://badgen.net/github/closed-issues/Ucnt/aws-s3-data-finder) |
| **[lazys3](https://github.com/nahamsec/lazys3)** | bruteforce AWS s3 buckets using different permutations |[](https://badgen.net/github/stars/nahamsec/lazys3)| [](https://badgen.net/github/contributors/nahamsec/lazys3)[](https://badgen.net/github/watchers/nahamsec/lazys3)[](https://badgen.net/github/last-commit/nahamsec/lazys3) [ [](https://badgen.net/github/closed-issues/nahamsec/lazys3) |
| **[BucketScanner](https://github.com/securing/BucketScanner)** | Test objects' permissions in AWS buckets |[](https://badgen.net/github/stars/securing/BucketScanner)| [](https://badgen.net/github/contributors/securing/BucketScanner)[](https://badgen.net/github/watchers/securing/BucketScanner)[](https://badgen.net/github/last-commit/securing/BucketScanner) [](https://badgen.net/github/open-issues/securing/BucketScanner) [](https://badgen.net/github/closed-issues/securing/BucketScanner) |
| **[aws-externder-cli](https://github.com/VirtueSecurity/aws-extender-cli)** | Test S3 buckets as well as Google Storage buckets and Azure Storage containers to find interesting files |[](https://badgen.net/github/stars/VirtueSecurity/aws-extender-cli)| [](https://badgen.net/github/contributors/VirtueSecurity/aws-extender-cli)[](https://badgen.net/github/watchers/VirtueSecurity/aws-extender-cli)[](https://badgen.net/github/last-commit/VirtueSecurity/aws-extender-cli) [](https://badgen.net/github/open-issues/VirtueSecurity/aws-extender-cli) [](https://badgen.net/github/closed-issues/VirtueSecurity/aws-extender-cli) |
| **[festin](https://github.com/cr0hn/festin)** | S3 bucket weakness discovery | [](https://badgen.net/github/stars/cr0hn/festin) | [](https://badgen.net/github/contributors/cr0hn/festin) [](https://badgen.net/github/watchers/cr0hn/festin) [](https://badgen.net/github/last-commit/cr0hn/festin) [](https://badgen.net/github/open-issues/cr0hn/festin) [](https://badgen.net/github/closed-issues/cr0hn/festin) |
| **[S3Insights](https://github.com/kurmiashish/S3Insights)** | a platform for efficiently deriving security insights about S3 data through metadata analysis | [](https://badgen.net/github/stars/kurmiashish/S3Insights) | [](https://badgen.net/github/contributors/kurmiashish/S3Insights) [](https://badgen.net/github/watchers/kurmiashish/S3Insights) [](https://badgen.net/github/last-commit/kurmiashish/S3Insights) [](https://badgen.net/github/open-issues/kurmiashish/S3Insights) [](https://badgen.net/github/closed-issues/kurmiashish/S3Insights) |
| **[s3_objects_check](https://github.com/nccgroup/s3_objects_check)** | Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files. | [](https://badgen.net/github/stars/nccgroup/s3_objects_check) | [](https://badgen.net/github/contributors/nccgroup/s3_objects_check) [](https://badgen.net/github/watchers/nccgroup/s3_objects_check) [](https://badgen.net/github/last-commit/nccgroup/s3_objects_check) [](https://badgen.net/github/open-issues/nccgroup/s3_objects_check) [](https://badgen.net/github/closed-issues/nccgroup/s3_objects_check) |
| **[s3dns](https://github.com/olizimmermann/s3dns)** | Passive DNS-based discovery of S3 (and other cloud) buckets by resolving CNAMEs and IPs during recon—ideal for stealthy and early identification of cloud storage exposures | [](https://badgen.net/github/stars/olizimmermann/s3dns) | [](https://badgen.net/github/contributors/olizimmermann/s3dns)[](https://badgen.net/github/watchers/olizimmermann/s3dns)[](https://badgen.net/github/last-commit/olizimmermann/s3dns) [](https://badgen.net/github/open-issues/olizimmermann/s3dns) [](https://badgen.net/github/closed-issues/olizimmermann/s3dns) |
## 培训
| Name | Description | Popularity | Metadata |
| ---------- | :---------- | :----------: | :----------: |
| **[Flaws.cloud](http://flaws.cloud/)** | flAWS challenge to learn through a series of levels about common mistakes and gotchas when using AWS | | | | | |
| **[Flaws2.cloud](http://flaws2.cloud/)** | flAWS 2 has two paths this time Attacker and Defender! In the Attacker path you'll exploit your way through misconfigurations in serverless (Lambda) and containers (ECS Fargate). In the Defender path that target is now viewed as the victim and you'll work as an incident responder for that same app understanding how an attack happened | | | | | |
| **[CloudGoat](https://github.com/RhinoSecurityLabs/cloudgoat)** | Vulnerable by Design AWS infrastructure setup tool |[](https://badgen.net/github/stars/RhinoSecurityLabs/cloudgoat)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/watchers/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/cloudgoat) |
| **[dvca](https://github.com/m6a-UdS/dvca)** | Damn Vulnerable Cloud Application [more info](https://medium.com/poka-techblog/privilege-escalation-in-the-cloud-from-ssrf-to-global-account-administrator-fd943cf5a2f6) |[](https://badgen.net/github/stars/m6a-Ud/dvca)| [](https://badgen.net/github/contributors/m6a-UdS/dvca)[](https://badgen.net/github/watchers/m6a-UdS/dvca)[](https://badgen.net/github/last-commit/m6a-UdS/dvca) [](https://badgen.net/github/open-issues/m6a-UdS/dvca) [](https://badgen.net/github/closed-issues/m6a-UdS/dvca) |
| **[AWSDetonationLab](https://github.com/sonofagl1tch/AWSDetonationLab)** | Scripts and templates to generate some basic detections of the AWS security services |[](https://badgen.net/github/stars/sonofagl1tch/AWSDetonationLab)| [](https://badgen.net/github/contributors/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/watchers/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/last-commit/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/open-issues/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/closed-issues/sonofagl1tch/AWSDetonationLab) |
| **[Flaws.cloud](http://flaws.cloud/)** | flAWS challenge to learn through a series of levels about common mistakes and gotchas when using AWS | | | | | |
| **[Flaws2.cloud](http://flaws2.cloud/)** | flAWS 2 has two paths this time Attacker and Defender! In the Attacker path you'll exploit your way through misconfigurations in serverless (Lambda) and containers (ECS Fargate). In the Defender path that target is now viewed as the victim and you'll work as an incident responder for that same app understanding how an attack happened | | | | | |
| **[CloudGoat](https://github.com/RhinoSecurityLabs/cloudgoat)** | Vulnerable by Design AWS infrastructure setup tool |[](https://badgen.net/github/stars/RhinoSecurityLabs/cloudgoat)| [](https://badgen.net/github/contributors/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/watchers/RhinoSecurityLabs/cloudgoat)[](https://badgen.net/github/last-commit/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/open-issues/RhinoSecurityLabs/cloudgoat) [](https://badgen.net/github/closed-issues/RhinoSecurityLabs/cloudgoat) |
| **[dvca](https://github.com/m6a-UdS/dvca)** | Damn Vulnerable Cloud Application [more info](https://medium.com/poka-techblog/privilege-escalation-in-the-cloud-from-ssrf-to-global-account-administrator-fd943cf5a2f6) |[](https://badgen.net/github/stars/m6a-UdS/dvca)| [](https://badgen.net/github/contributors/m6a-UdS/dvca)[](https://badgen.net/github/watchers/m6a-UdS/dvca)[](https://badgen.net/github/last-commit/m6a-UdS/dvca) [](https://badgen.net/github/open-issues/m6a-UdS/dvca) [](https://badgen.net/github/closed-issues/m6a-UdS/dvca) |
| **[AWSDetonationLab](https://github.com/sonofagl1tch/AWSDetonationLab)** | Scripts and templates to generate some basic detections of the AWS security services |[](https://badgen.net/github/stars/sonofagl1tch/AWSDetonationLab)| [](https://badgen.net/github/contributors/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/watchers/sonofagl1tch/AWSDetonationLab)[](https://badgen.net/github/last-commit/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/open-issues/sonofagl1tch/AWSDetonationLab) [](https://badgen.net/github/closed-issues/sonofagl1tch/AWSDetonationLab) |
| **[OWASPServerlessGoat](https://github.com/OWASP/Serverless-Goat)** | OWASP ServerlessGoat 是一个由 OWASP 维护的用于教育目的的故意不安全的真实 AWS Lambda 无服务器应用程序。通过 AWS Serverless Application Repository 可一键安装。 |[](https://badgen.net/github/stars/OWASP/Serverless-Goat)| [](https://badgen.net/github/contributors/OWASP/Serverless-Goat)[](https://badgen.net/github/watchers/OWASP/Serverless-Goat)[](https://badgen.net/github/last-commit/OWASP/Serverless-Goat) [](https://badgen.net/github/open-issues/OWASP/Serverless-Goat) [](https://badgen.net/github/closed-issues/OWASP/Serverless-Goat) |
| **[Sadcloud](https://github.com/nccgroup/sadcloud)** | 一个用于通过 Terraform 启动不安全的 AWS 基础设施的工具。它支持大约 22 个 AWS 服务中的约 84 种误配置。 |[](https://badgen.net/github/stars/nccgroup/sadcloud)| [](https://badgen.net/github/contributors/nccgroup/sadcloud)[](https://badgen.net/github/watchers/nccgroup/sadcloud)[](https://badgen.net/github/last-commit/nccgroup/sadcloud) [](https://badgen.net/github/open-issues/nccgroup/sadcloud) [](https://badgen.net/github/closed-issues/nccgroup/sadcloud) |
| **[BigOrange Actions](https://bigorange.cloud/actions/)** | 粘贴您的 IAM 策略并获取其可以有效执行的操作列表 | | | | | |
| **[IncidentResponseGenerator](https://github.com/disruptops/IncidentResponseGenerator)** | 培训课程的事件响应生成器 |[](https://badgen.net/github/stars/disruptops/IncidentResponseGenerator)| [](https://badgen.net/github/contributors/disruptops/IncidentResponseGenerator)[](https://badgen.net/github/watchers/disruptops/IncidentResponseGenerator)[](https://badgen.net/github/last-commit/disruptops/IncidentResponseGenerator) [](https://badgen.net/github/open-issues/disruptops/IncidentResponseGenerator) [](https://badgen.net/github/closed-issues/disruptops/IncidentResponseGenerator) |
| **[Breaking and Pwning Apps and Servers on AWS and Azure](https://github.com/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)** | 课程内容、实验设置说明以及我们广受欢迎的《在 AWS 和 Azure 上破解和入侵应用程序与服务器》动手培训的文档! |[](https://badgen.net/github/stars/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)| [](https://badgen.net/github/contributors/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)[](https://badgen.net/github/watchers/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training)[](https://badgen.net/github/last-commit/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) [](https://badgen.net/github/open-issues/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) [](https://badgen.net/github/closed-issues/appsecco/breaking-and-pwning-apps-and-servers-aws-azure-training) |
| **[terragoat](https://github.com/bridgecrewio/terragoat)** | “按设计易受攻击”的 Terraform 仓库。TerraGoat 是一个学习和培训项目,展示了常见的配置错误如何进入生产云环境。 | [](https://badgen.net/github/stars/bridgecrewio/terragoat) | [](https://badgen.net/github/contributors/bridgecrewio/terragoat) [](https://badgen.net/github/watchers/bridgecrewio/terragoat) [](https://badgen.net/github/last-commit/bridgecrewio/terragoat) [](https://badgen.net/github/open-issues/bridgecrewio/terragoat) [](https://badgen.net/github/closed-issues/bridgecrewio/terragoat) |
| **[cfngoat](https://github.com/bridgecrewio/cfngoat)** | “按设计易受攻击”的 CloudFormation 仓库。CfnGoat 是一个学习和培训项目,展示了常见的配置错误如何进入生产云环境。 | [](https://badgen.net/github/stars/bridgecrewio/cfngoat) | [](https://badgen.net/github/contributors/bridgecrewio/cfngoat) [](https://badgen.net/github/watchers/bridgecrewio/cfngoat) [](https://badgen.net/github/last-commit/bridgecrewio/cfngoat) [](https://badgen.net/github/open-issues/bridgecrewio/cfngoat) [](https://badgen.net/github/closed-issues/bridgecrewio/cfngoat) |
| **[CDKgoat](https://github.com/bridgecrewio/cdkgoat)** | “按设计易受攻击”的 AWS CDK 仓库。CDKGoat 是一个学习和培训项目,展示了常见的配置错误如何进入不偏不倚的 IaC(如 AWS CDK)。 | [](https://badgen.net/github/stars/bridgecrewio/cdkgoat) | [](https://badgen.net/github/contributors/bridgecrewio/cdkgoat) [](https://badgen.net/github/watchers/bridgecrewio/cdkgoat) [](https://badgen.net/github/last-commit/bridgecrewio/cdkgoat) [](https://badgen.net/github/open-issues/bridgecrewio/cdkgoat) [](https://badgen.net/github/closed-issues/bridgecrewio/cdkgoat) |
| **[aws_exposable_resources](https://github.com/SummitRoute/aws_exposable_resources)** | 可以在 AWS 上公开暴露的资源类型 | [](https://badgen.net/github/stars/SummitRoute/aws_exposable_resources) | [](https://badgen.net/github/contributors/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/watchers/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/last-commit/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/open-issues/SummitRoute/aws_exposable_resources) [](https://badgen.net/github/closed-issues/SummitRoute/aws_exposable_resources) |
| **[IAM Vulnerable](https://github.com/BishopFox/iam-vulnerable)** | 使用 Terraform 创建您自己的按设计易受攻击的 AWS IAM 权限提升游乐场 | [](https://badgen.net/github/stars/BishopFox/iam-vulnerable) | [](https://badgen.net/github/contributors/BishopFox/iam-vulnerable) [](https://badgen.net/github/watchers/BishopFox/iam-vulnerable) [](https://badgen.net/github/last-commit/BishopFox/iam-vulnerable) [](https://badgen.net/github/open-issues/BishopFox/iam-vulnerable) [](https://badgen.net/github/closed-issues/BishopFox/iam-vulnerable) |
| **[PenTesting.Cloud](https://pentesting.cloud/)** | 免费 AWS 安全实验室 - CTF 风格 | | |
| **[AWSGoat : A Damn Vulnerable AWS Infrastructure](https://github.com/ine-labs/AWSGoat)** | AWSGoat 是一个按设计易受攻击的 AWS 基础设施,包含 OWASP Top 10 Web 应用程序安全风险(2021)和基于 AWS 服务的误配置。 | [](https://badgen.net/github/stars/ine-labs/AWSGoat) | [](https://badgen.net/github/contributors/ine-labs/AWSGoat) [](https://badgen.net/github/watchers/ine-labs/AWSGoat) [](https://badgen.net/github/last-commit/ine-labs/AWSGoat) [](https://badgen.net/github/open-issues/ine-labs/AWSGoat) [](https://badgen.net/github/closed-issues/ine-labs/AWSGoat) |
## 其他有趣的工具/代码
**Honey-token:**
* [https://bitbucket.org/asecurityteam/spacecrab](https://bitbucket.org/asecurityteam/spacecrab)
* [https://breachinsider.com/honey-buckets/](https://breachinsider.com/honey-buckets/)
* [https://github.com/0x4D31/honeyLambda](https://github.com/0x4D31/honeyLambda)
* [https://github.com/thinkst/canarytokens-docker](https://github.com/thinkst/canarytokens-docker)
**More Resources:**
* **asecure.cloud** [https://github.com/asecure.cloud](https://github.com/asecure.cloud) A repository of cutomizable AWS security configurations (Cloudformation and CLI templates)
* **s3-leaks** [https://github.com/nagwww/s3-leaks](https://github.com/nagwww/s3-leaks) - a list of some biggest leaks recorded
* **Model Risk AWS** [https://magoo.github.io/model-risk-aws/](https://magoo.github.io/model-risk-aws/) - POC about probabilistic risk model for AWS
* **asecure.cloud** [https://asecure.cloud/](https://asecure.cloud/) - a great place for security resources regarding AWS Security.
* **honeybuckets** [https://github.com/honey-buckets/](https://github.com/honey-buckets/)
* **thebuckhacker** [https://github.com/thebuckhacker](https://github.com/thebuckhacker)
* **buckets.grayhatwarfare** [https://github.com/buckets.grayhatwarfare](https://github.com/buckets.grayhatwarfare)
* **Cloud Security Newsletter by Marco Lancini** [https://cloudseclist.com/](https://cloudseclist.com/)
* **Cloud Security Podcast by Ashish Rajan** [https://www.cloudsecuritypodcast.tv](https://www.cloudsecuritypodcast.tv)
* **AWS Security Primer By Michael Wittig** [https://cloudonaut.io/aws-security-primer/](https://cloudonaut.io/aws-security-primer/)
* **Hacking The Cloud** [https://hackingthe.cloud/](https://hackingthe.cloud/)
* **ThreatModel for Amazon S3** [https://github.com/trustoncloud/threatmodel-for-aws-s3](https://github.com/trustoncloud/threatmodel-for-aws-s3) - Library of all the attack scenarios on Amazon S3 and how to mitigate them, following a risk-based approach
标签:AWS安全, AWS安全工具, CIS, CloudMapper, GDPR, HIPAA, JS文件枚举, MITM代理, NIST, PCI-DSS, Prowler, Python, SOC2, Well-Architected, 云安全评估, 反取证, 取证准备, 多线程, 安全库存, 安全评估, 审计, 开源安全工具, 持续监控, 指令注入, 提示词模板, 无后门, 服务器监控, 硬加固, 请求拦截, 进攻安全, 逆向工具, 逆向工程平台, 速率限制