CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.
The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]
gcloud auth print-access-token
.bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]
--not-use-hacktricks-ai
flag.CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…