Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/z0ph/aws-security-toolbox
AWS Security Tools (AST) in a simple Docker container. :package:
https://github.com/z0ph/aws-security-toolbox
amazon-web-services assessments audit aws security
Last synced: about 1 month ago
JSON representation
AWS Security Tools (AST) in a simple Docker container. :package:
- Host: GitHub
- URL: https://github.com/z0ph/aws-security-toolbox
- Owner: z0ph
- License: apache-2.0
- Created: 2019-11-13T21:13:15.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2021-05-20T13:06:05.000Z (over 3 years ago)
- Last Synced: 2024-08-01T15:16:34.463Z (4 months ago)
- Topics: amazon-web-services, assessments, audit, aws, security
- Language: Shell
- Homepage: https://zoph.me
- Size: 30.3 KB
- Stars: 283
- Watchers: 17
- Forks: 25
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - z0ph/aws-security-toolbox - AWS Security Tools (AST) in a simple Docker container. :package: (Shell)
README
# AWS Security Toolbox (AST) :lock:
This toolbox will bring to you all necessary apps and tooling as a simple portable and preinstalled Docker container for SecOps on AWS, especially for auditing and assessments purpose.
This will reduce the overhead and the headache of installation these tools and dependencies.
## Included Tools
- [awscli](https://aws.amazon.com/cli/)
- [CloudMapper](https://github.com/duo-labs/cloudmapper)
- [CloudTracker](https://github.com/duo-labs/cloudtracker)
- [prowler](https://github.com/toniblyx/prowler)
- [ScoutSuite](https://github.com/nccgroup/ScoutSuite)
- [PMapper](https://github.com/nccgroup/PMapper)
- [Enumerate-IAM](https://github.com/andresriancho/enumerate-iam)## Getting Started
### Optional (host machine)
- [aws-vault](https://github.com/99designs/aws-vault)
### Requirements
- docker [macOS](https://docs.docker.com/docker-for-mac/) or [Linux](https://docs.docker.com/install/linux/docker-ce/debian/)
- `awscli` installed & configured
- create `.env` file before building your Docker image locally (see [.env.example](./.env.example)) to set your `DEFAULT_AWS_REGION` and `PROFILE_NAME` (for aws-vault)## Usage
Clone the repository:
$ git clone https://github.com/z0ph/aws-security-toolbox.git
There is two options to use this toolbox,
- Option #1 (**Interactive**), you are using local `awscli` with `~/.aws/credentials` populated.
- Option #2 (`aws-vault`), you want to use your local `aws-vault` installation.*Info: Working directory within the container: `/opt/secops`*
## Option 1 (Interactive)
$ ./ast.sh login
When you are logged into the shell of the container in interactive mode (`-it`), you will be able to perform your audit/assessment with confidence thanks to pre-populated tools.
Example:
$ ./opt/secops/prowler/prowler -b | ansi2html -la > /tmp/prowler-report.html
*nb: `/tmp` is mapped to your own (host machine) `/tmp` folder.*
## Option 2 (`aws-vault`)
$ ./ast.sh exec /opt/secops/prowler/prowler -b -s > report-prod.txt
*nb: if you are not using `default` aws-vault profile name, please modify options in `ast.sh`*
### Optional
if you want to build your own container **locally** to get latest updates from tools maintainers, run the following command.
$ make build
## License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details
## Authors
* **Victor GRENU** - *Initial work* - [zoph.io](https://github.com/zoph-io)