CloudFox is a command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure. It currently supports AWS & GCP.

The main inspiration for CloudFox was to create something like PowerView for cloud infrastructure. A collection of enumeration commands that illuminate attack paths even for those relatively new to cloud penetration testing. To do this, we codified our many sed/awk/grep/jq incantations into a tool that is portable, modular, and quick. Our primary audience is penetration testers, but we think CloudFox will be useful for all cloud security practitioners. CloudFox currently supports Amazon Web Services (AWS) & Google Cloud Platform (GCP).
With CloudFox, security practitioners can:
CloudFoxable is an intentionally vulnerable AWS environment created specifically to teach the art of AWS cloud penetration testing, while showcasing CloudFox’s capabilities that help you find latent attack paths more effectively.
Drawing inspiration from CloudGoat, flaws.cloud, and Metasploitable, CloudFoxable provides a wide array of flags and attack paths in a capture-the-flag (CTF) format.
Creators & Contributors
Seth Art
Bishop Fox Alumnus
Carlos Vendramini
Bishop Fox Alumnus
Joseph Barcia
Senior Security Consultant
WORKSHOP
CloudFox: Cloud Enumeration for Penetration Testing
In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and identify interesting attack paths.
BLOG
Introducing CloudFox GCP: Attack Path Identification for Google Cloud
CloudFox GCP extends CloudFox’s offensive security methodology to Google Cloud Platform, enabling practitioners to enumerate cloud resources, map identity permissions, and identify service account risks across the organization hierarchy.
WALKTHROOUGH
CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks
Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.