Loading...
AWS pwn is a collection of scripts designed for penetration testing activities targeting Amazon Web Services (AWS) environments. The toolset consists of various scripts that perform different tasks related to AWS security testing and assessment. The scripts are written in Python and require installation of dependencies through pip. Users need to configure their AWS credentials in the ~/.aws/credentials file to authenticate with AWS services. The tool was primarily developed by Daniel Grzelak with contributions from other security researchers, including Mike Fuller. The scripts are designed to help security professionals identify potential vulnerabilities and misconfigurations in AWS infrastructure during authorized penetration testing engagements. The collection includes multiple scripts that target different aspects of AWS security, allowing penetration testers to assess various AWS services and configurations. The tool requires proper AWS API credentials to function and interact with target AWS environments.
Common questions about AWS pwn including features, pricing, alternatives, and user reviews.
AWS pwn is A collection of Python scripts for conducting penetration testing activities against Amazon Web Services (AWS) environments.. It is a Vulnerability Management solution designed to help security teams with AWS.
Principal Mapper is a Python tool that models AWS IAM configurations as directed graphs to identify privilege escalation risks and alternative attack paths in AWS environments.
Get strategic cybersecurity insights in your inbox
A Python script that performs security testing attacks against AWS Cognito services including account creation, user enumeration, and privilege escalation vulnerabilities.
A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.
A proof-of-concept toolkit for fingerprinting and exploiting Amazon Web Services cloud infrastructures using the boto library.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.