Pacu is an open-source AWS exploitation framework developed by Rhino Security Labs for offensive security testing against cloud environments. The framework enables penetration testers to identify and exploit configuration flaws within AWS accounts through a modular architecture that allows for easy expansion of functionality. Current modules support various attack vectors including: - User privilege escalation - IAM user backdooring - Vulnerable Lambda function exploitation - Additional AWS-specific attack scenarios The tool requires Python 3.7+ and pip3 for installation, making it a lightweight solution for cloud penetration testing activities. Pacu focuses specifically on AWS environments and provides a structured approach to testing cloud security configurations and identifying potential vulnerabilities in AWS deployments.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.