Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically.

Scout Suite is stable and actively maintained, but a number of features and internals may change. As such, please bear with us as we find time to work on, and improve, the tool. Feel free to report a bug with details (please provide console output using the --debug argument), request a new feature, or send a pull request.

Also Read – FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell & .NET


The following cloud providers are currently supported/planned:

  • Amazon Web Services
  • Microsoft Azure (beta)
  • Google Cloud Platform
  • Alibaba Cloud (early alpha)
  • Oracle Cloud Infrastructure (early alpha)

Also Read – Aura Botnet : A Super Portable Botnet Framework With A Django-Based C2 Server


Scout Suite is written in Python and supports the following versions:

  • 3.5
  • 3.6
  • 3.7

The required libraries can be found in the requirements.txt file. We recommend using a virtual environment.



$ virtualenv -p python3 venv
$ source venv/bin/activate
$ pip install scoutsuite
$ scout –help

Via Git

$ git clone
$ cd ScoutSuite $ virtualenv -p python3 venv
$ source venv/bin/activate
$ pip install -r requirements.txt
$ python –help

Computing Resources

Scout Suite is a multi-threaded tool that fetches and stores your cloud account’s configuration settings in memory during runtime. It is expected that the tool will run with no issues on any modern laptop or equivalent VM.

Note that running Scout Suite in a VM with limited computing resources such as an AWS t2.micro instance is not intended and may result in the process being killed.



Use of Scout Suite does not require AWS users to complete and submit the AWS Vulnerability / Penetration Testing Request Form. Scout Suite only performs API calls to fetch configuration data and identify security gaps, which is not considered security scanning as it does not impact AWS’ network and applications.


Use of Scout Suite does not require Azure users to contact Microsoft to begin testing. The only requirement is that users abide by the Microsoft Cloud Unified Penetration Testing Rules of Engagement.


Google Cloud Platform

Use of Scout Suite does not require GCP users to contact Google to begin testing. The only requirement is that users abide by the Cloud Platform Acceptable Use Policy and the Terms of Service and ensure that tests only affect projects you own (and not other customers’ applications).



The following command will provide the list of available command line options:

$ python –help

You can also use this to get help on a specific provider:

$ python PROVIDER –help

For further details, checkout our Wiki pages at

After performing a number of API calls, Scout will create a local HTML report and open it in the default browser.

Also note that the command line will try to infer the argument name if possible when receiving partial switch. For example, this will work and use the selected profile:

$ python aws –profile PROFILE


Assuming you already have your provider’s CLI up and running you should have your credentials already set up and be able to run Scout Suite by using one of the following commands. If that is not the case, please consult the wiki page for the provider desired.

Amazon Web Services

$ python aws


$ python azure –cli

Google Cloud Platform

$ python gcp –user-account