Open Source    

Red-detector

Summary

  • Scan your EC2 instance to find its vulnerabilities using Vuls.
  • Audit your EC2 instance to find security misconfigurations using Lynis.
  • Scan your EC2 instance for signs of a rootkit using Chkrootkit.



    red-detector