Prowler
Apache-2.0馃敟 Offensive Ops 路 Python
Prowler is a cloud security assessment tool that performs over 300 checks against AWS, Azure, GCP, and Kubernetes infrastructures. Aligning with CIS benchmarks, it evaluates cloud environments for compliance and security vulnerabilities. Prowler is a critical resource for cloud security practitioners and auditors aiming to enhance the security posture of their cloud deployments through comprehensive and automated assessments.
Installation
$ pip install prowlerUse Cases
- Cloud security posture assessment
- CIS benchmark compliance scanning
- Multi-cloud misconfiguration detection
- Audit trail and evidence collection
- Continuous cloud security monitoring
Tags
Details
- Category
- 馃敟 Offensive Ops
- Language
- Python
- Repository
- prowler-cloud/prowler
- License
- Apache-2.0
- Platforms
- 馃惂linux馃崕macos馃獰windows
Links
Used in 1 Workflow
Community Reviews
No reviews yet. Be the first to review Prowler.
Alternatives & Comparisons
Cartography
PythonIntel graph of cloud infrastructure. Maps relationships between AWS, GCP, Azure, and other services into a Neo4j graph.
Compare Prowler vs CartographySteampipe
GoQuery cloud APIs with SQL. Zero-ETL approach to infrastructure visibility across AWS, Azure, GCP, and 140+ plugins.
Compare Prowler vs Steampipecloud_enum
PythonMulti-cloud OSINT enumeration. Discovers public resources across AWS, Azure, and GCP from keyword input.
Compare Prowler vs cloud_enumMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.