CloudFox Logo

CloudFox

0
Free
Visit Website

CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure. CloudFox helps you answer the following common questions (and many more): - What regions is this AWS account using and roughly how many resources are in the account? - What secrets are lurking in EC2 userdata or service specific environment variables? - What workloads have administrative permissions attached? - What actions/permissions does this [principal] have? - What role trusts are overly permissive or allow cross-account assumption? - What endpoints/hostnames/IPs can I attack from an external starting point (public internet)? - What endpoints/hostnames/IPs can I attack from an internal starting point (assumed breach within the VPC)? - What filesystems can I potentially mount from a compromised resource inside the VPC? Demos, Examples, Walkthroughs Blog - Introducing: CloudFox Video - CloudFox + CloudFoxable A Powerful Duo for Mastering the Art of Identifying and Exploiting AWS Attack Paths Video - Penetration Testing with CloudFox

FEATURES

ALTERNATIVES

A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing

Open-source tool for analyzing AWS temporary tokens to detect malicious activity.

minikube implements a local Kubernetes cluster for easy application development and supports various Kubernetes features.

A set of tools for fingerprinting and exploiting Amazon cloud infrastructures

A tool to analyze and audit AWS environments for security issues and misconfigurations.

S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.

Tool for analyzing cloud resources against best practices and generating reports.

Lists AWS resources using the AWS Cloud Control API and writes them to a JSON output file.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved