Cyber security

CloudPEASS : Cloud Privilege Escalation Awesome Script Suite

CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.

The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.

AzurePEASS

Functionality:

  • Permission Analysis: AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.
  • API Utilization: It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.
  • Token Requirements: Users need to provide tokens for both ARM and Graph APIs.

Usage:

  1. Obtain necessary tokens using Azure CLI commands.
  2. Run AzurePEASS with the tokens provided via command line or environment variables.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]

GCPPEASS

Functionality:

  • Permission Analysis: GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.
  • Brute Force Approach: It brute forces permissions across projects, folders, and organizations to minimize false negatives.
  • Resource Enumeration: Attempts to list VMs, Storages, Functions, and Service Accounts to check permissions.

Usage:

  1. Obtain a token using gcloud auth print-access-token.
  2. Run GCPPEASS with the token provided via command line or environment variable.
bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]

Key Features

  • HackTricks AI Integration: Both tools can use HackTricks AI to analyze permissions, though users can opt out with the --not-use-hacktricks-ai flag.
  • Output Customization: Results can be saved to a JSON file for further analysis.
  • Multithreading: Supports multithreading to improve performance.

CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Doing The Due Diligence : Analyzing The Next.js Middleware Bypass (CVE-2025-29927)

A critical vulnerability, CVE-2025-29927, has recently been identified in the Next.js ecosystem, allowing attackers to…

16 minutes ago

Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques

The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming…

3 hours ago

ByDeF : Mastering The Art Of Antivirus Evasion For Penetration Testing

ByDeF is a tool designed to generate an undetectable Portable Executable (PE) file, specifically a…

3 hours ago

CVE-2025-29927 : Next.js Middleware Authorization Bypass – Technical Analysis

A critical vulnerability, CVE-2025-29927, has been identified in Next.js, a React-based web framework by Vercel.…

23 hours ago

pugDNS : Revolutionizing DNS Query Speed And Accuracy For Advanced Networking Needs

pugDNS is an experimental, high-performance DNS query tool designed to facilitate fast and accurate bulk…

23 hours ago

ZeroDays CTF 2025 : A Comprehensive Overview

The ZeroDays CTF 2025, held on March 22nd at Croke Park in Dublin, Ireland, marks…

23 hours ago