You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+72-3Lines changed: 72 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,14 @@
1
1
# Scope - Cloud Forensics Tool
2
2
3
-
Scope is an open source tool for collecting and analyzing cloud logs for forensic investigations. Scope currently supports AWS CloudTrail logs with plans to extend to Azure and GCP in the future.
3
+
Scope is an Open Source Cloud Forensics tool for AWS. Scope can rapidly obtain logs, discover resources, and create super timelines for analysis.
4
4
5
5
## Features
6
6
7
7
-**AWS CloudTrail Collection**: Retrieve logs from S3 buckets or via the Management Events API
8
8
-**Normalized Timeline**: Convert cloud logs into a standardized timeline format
9
9
-**Multiple Export Formats**: Export timelines as CSV or JSON
10
-
-**Resource Discovery**: Identify available CloudTrail trails in your AWS account
10
+
-**Resource Discovery**: Identify available CloudTrail trails and AWS resources in your account
11
+
-**Credential Reports**: Generate and analyze IAM credential reports for security assessment
11
12
12
13
## Installation
13
14
@@ -97,7 +98,14 @@ To use Scope effectively, you'll need an AWS user with appropriate permissions.
97
98
"cloudtrail:DescribeTrails",
98
99
"s3:GetObject",
99
100
"s3:ListBucket",
100
-
"s3:GetBucketLocation"
101
+
"s3:GetBucketLocation",
102
+
"ec2:DescribeInstances",
103
+
"iam:ListUsers",
104
+
"iam:ListRoles",
105
+
"iam:GenerateCredentialReport",
106
+
"iam:GetCredentialReport",
107
+
"lambda:ListFunctions",
108
+
"rds:DescribeDBInstances"
101
109
],
102
110
"Resource": "*"
103
111
}
@@ -131,6 +139,24 @@ scope aws discover
131
139
132
140
This command will display information about each trail, including its name, S3 bucket location, and whether it logs management events.
133
141
142
+
### Discover AWS Resources
143
+
144
+
To discover various AWS resources in your account (EC2, S3, IAM, Lambda, RDS):
0 commit comments