Penetration testing toolset for the Amazon cloud.
$ pip install -r requirements.txt
1. Create file: ~/.skew
2. Edit file's content:
accounts:
"$ACCOUNT_ID_NUMBER$":
profile: default
Find example file in the repo: .skew
If conf.json is present, the scripts will use the credentials and configuration data from this config file. The SQS parameters only need to be set for the fuzzer.py script.
If the config file is not present, the scripts will use the shared credentials and configuration files from ~/.aws/credentials and ~/.aws/config
$ python chosen_file.py
example:
$ python rolepolicies.py
$ python dynamodb.py -t <TableName>
Lists inline and managed policies attached to the role of the instance profile.
Lists available resources with the given credentials.
Scans the given DynamoDB table, saving the results locally or uploading them publicly to an S3 bucket.
Scans the given SQS queue, saving the results locally or uploading them publicly to an S3 bucket.
Scans the available Cloudwatch logs, saving the results locally or uploading them publicly to an S3 bucket.
Sends fuzz messages to the given SQS queue.
More information about usage can be found using:
$ python chosen_file.py -h