adding Steampipe to the list of Defensive tools

adding in Steampipe.io in the Defensive Tools list
Also fixed the bolding on the cloudonaut link at the bottom of the page
This commit is contained in:
bob-bot
2021-08-11 15:11:22 -04:00
committed by GitHub
parent f5c39fbd2a
commit f3ba47ded2

View File

@@ -22,6 +22,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
## Defensive: Hardening, Security Assessment and Inventory
| Name | URL | Description | Popularity | Metadata |
| ---------- | :---------- | :---------- | :----------: | :----------: |
| **Steampipe** | [https://github.com/turbot/steampipe](https://github.com/turbot/steampipe) | Use SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required. (SQL) |[![stars](https://badgen.net/github/stars/turbot/steampipe)](https://badgen.net/github/stars/turbot/steampipe)| [![contributors](https://badgen.net/github/contributors/turbot/steampipe)](https://badgen.net/github/contributors/turbot/steampipe)[![watchers](https://badgen.net/github/watchers/turbot/steampipe)](https://badgen.net/github/watchers/turbot/steampipe)[![last-commit](https://badgen.net/github/last-commit/turbot/steampipe/main)](https://badgen.net/github/last-commit/turbot/steampipe/main) [![open-issues](https://badgen.net/github/open-issues/turbot/steampipe)](https://badgen.net/github/open-issues/turbot/steampipe) [![closed-issues](https://badgen.net/github/closed-issues/turbot/steampipe)](https://badgen.net/github/closed-issues/turbot/steampipe) |
| **ScoutSuite** | [https://github.com/nccgroup/ScoutSuite](https://github.com/nccgroup/ScoutSuite) | Multi-Cloud Security auditing tool for AWS Google Cloud and Azure environments (python) |[![stars](https://badgen.net/github/stars/nccgroup/ScoutSuite)](https://badgen.net/github/stars/nccgroup/ScoutSuite)| [![contributors](https://badgen.net/github/contributors/nccgroup/ScoutSuite)](https://badgen.net/github/contributors/nccgroup/ScoutSuite)[![watchers](https://badgen.net/github/watchers/nccgroup/ScoutSuite)](https://badgen.net/github/watchers/nccgroup/ScoutSuite)[![last-commit](https://badgen.net/github/last-commit/nccgroup/ScoutSuite)](https://badgen.net/github/last-commit/nccgroup/ScoutSuite) [![open-issues](https://badgen.net/github/open-issues/nccgroup/ScoutSuite)](https://badgen.net/github/open-issues/nccgroup/ScoutSuite) [![closed-issues](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite)](https://badgen.net/github/closed-issues/nccgroup/ScoutSuite) |
| **Prowler** | [https://github.com/toniblyx/prowler](https://github.com/toniblyx/prowler) | CIS benchmarks and additional checks for security best practices in AWS (bash and python components) |[![stars](https://badgen.net/github/stars/toniblyx/prowler)](https://badgen.net/github/stars/toniblyx/prowler)| [![contributors](https://badgen.net/github/contributors/toniblyx/prowler)](https://badgen.net/github/contributors/toniblyx/prowler)[![watchers](https://badgen.net/github/watchers/toniblyx/prowler)](https://badgen.net/github/watchers/toniblyx/prowler)[![last-commit](https://badgen.net/github/last-commit/toniblyx/prowler)](https://badgen.net/github/last-commit/toniblyx/prowler) [![open-issues](https://badgen.net/github/open-issues/toniblyx/prowler)](https://badgen.net/github/open-issues/toniblyx/prowler) [![closed-issues](https://badgen.net/github/closed-issues/toniblyx/prowler)](https://badgen.net/github/closed-issues/toniblyx/prowler) |
| **CloudSploit Scans** | [https://github.com/cloudsploit/scans](https://github.com/cloudsploit/scans) | AWS security scanning checks (NodeJS) |[![stars](https://badgen.net/github/stars/cloudsploit/scans)](https://badgen.net/github/stars/cloudsploit/scans)| [![contributors](https://badgen.net/github/contributors/cloudsploit/scans)](https://badgen.net/github/contributors/cloudsploit/scans)[![watchers](https://badgen.net/github/watchers/cloudsploit/scans)](https://badgen.net/github/watchers/cloudsploit/scans)[![last-commit](https://badgen.net/github/last-commit/cloudsploit/scans)](https://badgen.net/github/last-commit/cloudsploit/scans) [![open-issues](https://badgen.net/github/open-issues/cloudsploit/scans)](https://badgen.net/github/open-issues/cloudsploit/scans) [![closed-issues](https://badgen.net/github/closed-issues/cloudsploit/scans)](https://badgen.net/github/closed-issues/cloudsploit/scans) |
@@ -243,4 +244,4 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
* **buckets.grayhatwarfare** [https://github.com/buckets.grayhatwarfare](https://github.com/buckets.grayhatwarfare)
* **Cloud Security Newsletter by Marco Lancini** [https://cloudseclist.com/](https://cloudseclist.com/)
* **Cloud Security Podcast by Ashish Rajan** [https://www.cloudsecuritypodcast.tv](www.cloudsecuritypodcast.tv)
* **AWS Security Primer By Michael Wittig ** [https://cloudonaut.io/aws-security-primer/](https://cloudonaut.io/aws-security-primer/)
* **AWS Security Primer By Michael Wittig** [https://cloudonaut.io/aws-security-primer/](https://cloudonaut.io/aws-security-primer/)