EN
ENNA

WeirdAAL

☁️ Cloud Recon · Python

WeirdAAL (AWS Attack Library) is a Python framework for offensive testing of Amazon Web Services environments. It organizes AWS attacks into categorized modules covering enumeration (listing resources, permissions, and configurations across services), exploitation (abusing misconfigurations and excessive permissions), and persistence (creating backdoor access). WeirdAAL supports testing across a wide range of AWS services including IAM, EC2, S3, Lambda, STS, CloudTrail, and many others. Each module performs a specific action - from enumerating all S3 buckets and their ACLs, to checking for privilege escalation paths through IAM policy misconfigurations, to creating persistence mechanisms via Lambda backdoors. WeirdAAL uses boto3 and works with standard AWS credential configurations, making it easy to test with compromised or provided access keys.

838stars
94forks
22issues
Updated 1y ago

Installation

from source

$ git clone https://github.com/carnal0wnage/weirdAAL && cd weirdAAL && pip install -r requirements.txt

Use Cases

  • Enumerating AWS resources and permissions from compromised access keys
  • Identifying IAM privilege escalation paths in AWS environments
  • Testing S3 bucket configurations and ACLs for public access
  • Creating persistence mechanisms for simulated adversary exercises
  • Running organized AWS attack modules during cloud penetration tests

Tags

awscloud-pentestenumerationexploitationpersistenceiampentest-toolpython3

Alternatives & Comparisons

More in Cloud Recon