EN
ENNA

Cartography vs WeirdAAL

GitHub Stats

3.8k
Stars
838
507
Forks
94
140
Issues
22
4d ago
Updated
1y ago
Apache-2.0
License
-
Python
Language
Python

About Cartography

Cartography is a Python tool developed by Lyft that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by Neo4j. It ingests data from AWS, GCP, Azure, Okta, GitHub, and other services to build a comprehensive map of your cloud environment. Security teams use Cartography to identify attack paths, find misconfigurations, and understand blast radius by querying relationships between resources like EC2 instances, S3 buckets, IAM roles, and security groups. Its graph-based approach makes it easy to ask questions like 'which instances can reach this database' or 'which IAM users have admin access across accounts' that would be extremely difficult with flat inventory tools.

About WeirdAAL

WeirdAAL (AWS Attack Library) is a Python framework for offensive testing of Amazon Web Services environments. It organizes AWS attacks into categorized modules covering enumeration (listing resources, permissions, and configurations across services), exploitation (abusing misconfigurations and excessive permissions), and persistence (creating backdoor access). WeirdAAL supports testing across a wide range of AWS services including IAM, EC2, S3, Lambda, STS, CloudTrail, and many others. Each module performs a specific action - from enumerating all S3 buckets and their ACLs, to checking for privilege escalation paths through IAM policy misconfigurations, to creating persistence mechanisms via Lambda backdoors. WeirdAAL uses boto3 and works with standard AWS credential configurations, making it easy to test with compromised or provided access keys.

Platform Support

🐧linux🍎macos
🐧linux🍎macos🪟windows

Tags

Shared

aws

Cartography only

cloud-graphneo4jgcpazureattack-pathasset-inventory

WeirdAAL only

cloud-pentestenumerationexploitationpersistenceiam