Cloud Privilege Escalation & Post-Exploitation
A pure Bash framework for cloud security assessments. Auto-detect cloud providers, enumerate permissions, discover escalation paths, and generate detailed reports. Built for red teamers and cloud security professionals.
Enumerate identities, permissions, services, network configs, and secrets across cloud environments automatically.
Identify 14+ AWS IAM escalation paths including CreatePolicyVersion, PassRole+Lambda, AttachUserPolicy, and more.
Map trust relationships, cross-service pivots, and reachable targets. Move between accounts and services.
Evaluate and deploy persistence mechanisms. Backdoor IAM roles, Lambda triggers, and scheduled tasks.
Discover sensitive data stores, classify data, and evaluate exfiltration channels across S3, RDS, and more.
Generate assessment reports in text, JSON, or HTML format. Structured findings with severity ratings and evidence.
Auto-detect cloud provider via metadata endpoints and CLI tools. Enumerate identity, permissions, services, and network topology. ./s7aba.sh recon
Simulate IAM actions to discover dangerous permissions. Map escalation paths ranked by severity. Optionally exploit with confirmation. ./s7aba.sh privesc
Discover cross-account trust relationships, service-linked roles, and pivot points to expand access across the environment. ./s7aba.sh lateral
Establish persistence through IAM backdoors and triggers. Discover and classify sensitive data for controlled exfiltration testing. ./s7aba.sh persist
Remove all artifacts and traces. Generate comprehensive assessment reports with findings, severity ratings, and remediation guidance. ./s7aba.sh cleanup && ./s7aba.sh report
S7aba is designed for authorized security testing only. Usage of this tool for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state, and federal laws. The author assumes no liability and is not responsible for any misuse or damage.