Cloud security assessment — AWS, Azure, GCP attack paths.
Official PageOfficial AWS command-line interface
pip3 install awscliaws sts get-caller-identity; aws iam list-users; aws s3 lsAWS situational awareness tool
go install github.com/BishopFox/cloudfox@latestcloudfox aws --profile pentest all-checksBrute-force IAM permissions
git clone https://github.com/andresriancho/enumerate-iampython3 enumerate-iam.py --access-key AKIA... --secret-key ...AWS exploitation framework
git clone https://github.com/RhinoSecurityLabs/pacu && pip3 install -r requirements.txtpython3 pacu.py; run iam__enum_permissionsOfficial Azure command-line interface
pip3 install azure-cliaz login; az account list; az role assignment list --allBloodHound collector for Azure
go install github.com/BloodHoundAD/AzureHound@latestazurehound list -t tenantid -u user -p passAzure AD exploration framework
pip3 install roadreconroadrecon gather -u user -p pass; roadrecon guiOfficial GCP command-line interface
sudo apt install google-cloud-sdkgcloud auth login; gcloud projects list; gcloud iam service-accounts listKubernetes CLI
sudo apt install kubectlkubectl get pods -A; kubectl describe pod <name>Multi-cloud security auditor
pip3 install scoutsuitescout aws --profile default; scout azure --cli