Cloud Recon
19 tools indexed
Cloud security assessment tools for auditing AWS, Azure, and GCP environments. These tools scan for misconfigured S3 buckets, overly permissive IAM policies, exposed cloud resources, and compliance violations across cloud infrastructure.
ScoutSuite
Multi-cloud security auditing tool for AWS, Azure, GCP, Alibaba Cloud, and Oracle Cloud.
CloudMapper
Analyze AWS environments to create network diagrams and identify security risks.
S3Scanner
Scan for misconfigured S3 buckets across AWS regions and dump accessible contents.
CloudBrute
Cloud infrastructure enumerator to find company assets across multiple cloud providers.
MicroBurst
PowerShell toolkit for attacking Azure services including storage, key vaults, and automation.
ROADtools
Framework for Azure AD enumeration and exploitation via the internal ROADrecon and ROADlib modules.
CloudFox
Find exploitable attack paths in cloud infrastructure by enumerating IAM permissions, secrets, and network exposure.
enumerate-iam
Enumerate AWS IAM permissions for a given set of credentials by brute-forcing API calls.
CloudSploit
Open-source cloud security configuration scanner for AWS, Azure, GCP, and Oracle Cloud Infrastructure.
Cartography
Intel graph of cloud infrastructure. Maps relationships between AWS, GCP, Azure, and other services into a Neo4j graph.
Steampipe
Query cloud APIs with SQL. Zero-ETL approach to infrastructure visibility across AWS, Azure, GCP, and 140+ plugins.
cloud_enum
Multi-cloud OSINT enumeration. Discovers public resources across AWS, Azure, and GCP from keyword input.
CloudFlair
Find origin servers behind Cloudflare. Uses Censys to discover the real IP address of Cloudflare-protected websites.
WeirdAAL
AWS Attack Library. Enumerate, exploit, and backdoor AWS services with organized modules for cloud penetration testing.
Stratus Red Team
Datadog's adversary emulation for cloud environments (AWS, Azure, GCP, K8s) mapped to MITRE ATT&CK.
Checkov
Static analysis for infrastructure-as-code scanning Terraform, CloudFormation, and K8s.
aws-vault
Securely stores and accesses AWS credentials in your operating system's keystore, never writing them to disk.
CloudGoat
Rhino Security's 'vulnerable by design' AWS deployment tool for practicing cloud penetration testing techniques.
KICS
Infrastructure-as-Code security scanner supporting Terraform, CloudFormation, Kubernetes, Docker, Ansible, and more.