Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
| **[CloudMapper](https://github.com/duo-labs/cloudmapper)** | helps you analyze your AWS environments (Python) |[![stars](https://badgen.net/github/stars/duo-labs/cloudmapper)](https://badgen.net/github/stars/duo-labs/cloudmapper)| [![contributors](https://badgen.net/github/contributors/duo-labs/cloudmapper)](https://badgen.net/github/contributors/duo-labs/cloudmapper)[![watchers](https://badgen.net/github/watchers/duo-labs/cloudmapper)](https://badgen.net/github/watchers/duo-labs/cloudmapper)[![last-commit](https://badgen.net/github/last-commit/duo-labs/cloudmapper)](https://badgen.net/github/last-commit/duo-labs/cloudmapper) [![open-issues](https://badgen.net/github/open-issues/duo-labs/cloudmapper)](https://badgen.net/github/open-issues/duo-labs/cloudmapper) [![closed-issues](https://badgen.net/github/closed-issues/duo-labs/cloudmapper)](https://badgen.net/github/closed-issues/duo-labs/cloudmapper) |
| **[ScoutSuite](https://github.com/nccgroup/ScoutSuite)** | Multi-Cloud Security auditing tool for AWS Google Cloud and Azure environments (python) |[![stars](https://badgen.net/github/stars/nccgroup/ScoutSuite)](https://badgen.net/github/stars/nccgroup/ScoutSuite)| [![contributors](https://badgen.net/github/contributors/nccgroup/ScoutSuite)](https://badgen.net/github/contributors/nccgroup/ScoutSuite)[![watchers](https://badgen.net/github/watchers/nccgroup/ScoutSuite)](https://badgen.net/github/watchers/nccgroup/ScoutSuite)[![last-commit](https://badgen.net/github/last-commit/nccgroup/ScoutSuite)](https://badgen.net/github/last-commit/nccgroup/ScoutSuite) [![open-issues](https://badgen.net/github/open-issues/nccgroup/ScoutSuite)](https://badgen.net/github/open-issues/nccgroup/ScoutSuite) [![closed-issues](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite)](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite) |
| **[CloudCustodian](https://github.com/cloud-custodian/cloud-custodian/)** | Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources |[![stars](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [![contributors](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[![watchers](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[![last-commit](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/)](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [![open-issues](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [![closed-issues](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) |
| **[CloudSecure](https://github.com/carlosinfantes/cloudsecure)** | AWS security assessment platform with AI-powered analysis, Prowler integration, and automated CIS benchmark scanning. Built serverless with CDK, Lambda, and Step Functions (Python/TypeScript) |[![stars](https://badgen.net/github/stars/carlosinfantes/cloudsecure)](https://badgen.net/github/stars/carlosinfantes/cloudsecure)| [![contributors](https://badgen.net/github/contributors/carlosinfantes/cloudsecure)](https://badgen.net/github/contributors/carlosinfantes/cloudsecure)[![watchers](https://badgen.net/github/watchers/carlosinfantes/cloudsecure)](https://badgen.net/github/watchers/carlosinfantes/cloudsecure)[![last-commit](https://badgen.net/github/last-commit/carlosinfantes/cloudsecure)](https://badgen.net/github/last-commit/carlosinfantes/cloudsecure) [![open-issues](https://badgen.net/github/open-issues/carlosinfantes/cloudsecure)](https://badgen.net/github/open-issues/carlosinfantes/cloudsecure) [![closed-issues](https://badgen.net/github/closed-issues/carlosinfantes/cloudsecure)](https://badgen.net/github/closed-issues/carlosinfantes/cloudsecure) |
| **[ICE](https://github.com/Teevity/ice)** | Ice provides insights from a usage and cost perspective with high detail dashboards. |[![stars](https://badgen.net/github/stars/Teevity/ice)](https://badgen.net/github/stars/Teevity/ice)| [![contributors](https://badgen.net/github/contributors/Teevity/ice)](https://badgen.net/github/contributors/Teevity/ice)[![watchers](https://badgen.net/github/watchers/Teevity/ice)](https://badgen.net/github/watchers/Teevity/ice)[![last-commit](https://badgen.net/github/last-commit/Teevity/ice)](https://badgen.net/github/last-commit/Teevity/ice) [![open-issues](https://badgen.net/github/open-issues/Teevity/ice)](https://badgen.net/github/open-issues/Teevity/ice) [![closed-issues](https://badgen.net/github/closed-issues/Teevity/ice)](https://badgen.net/github/closed-issues/Teevity/ice) |
| **[CloudSploit Scans](https://github.com/cloudsploit/scans)** | AWS security scanning checks (NodeJS) |[![stars](https://badgen.net/github/stars/cloudsploit/scans)](https://badgen.net/github/stars/cloudsploit/scans)| [![contributors](https://badgen.net/github/contributors/cloudsploit/scans)](https://badgen.net/github/contributors/cloudsploit/scans)[![watchers](https://badgen.net/github/watchers/cloudsploit/scans)](https://badgen.net/github/watchers/cloudsploit/scans)[![last-commit](https://badgen.net/github/last-commit/cloudsploit/scans)](https://badgen.net/github/last-commit/cloudsploit/scans) [![open-issues](https://badgen.net/github/open-issues/cloudsploit/scans)](https://badgen.net/github/open-issues/cloudsploit/scans) [![closed-issues](https://badgen.net/github/closed-issues/cloudsploit/scans)](https://badgen.net/github/closed-issues/cloudsploit/scans) |
| **[AWS Network Access Analyzer](https://github.com/aws-samples/network-access-analyzer-multi-account-analysis)** | Automation for Amazon VPC Network Access Analyzer to identify all possible Internet Gateway reachability for your resources across all your AWS accounts |[![stars](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)| [![contributors](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)[![watchers](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)[![last-commit](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis) [![open-issues](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis) [![closed-issues](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis) |
Expand Down