Skip to main content

AWS Cloud Attack Path Mapping — BloodHound-style graph analysis (recon + planning + simulation, no execution)

Project description

Atlas

AWS Cloud Adversary Emulation Platform


⚠️ This tool is still under development. APIs and behavior may change. Use with caution in production environments.


Attack Knowledge: pathfinding.cloud & Hacking the Cloud

Atlas incorporates all techniques from pathfinding.cloud (parginfd.cloud — Datadog's verified AWS IAM privilege escalation paths). The 65+ attack paths—covering IAM, EC2, Lambda, ECS, Glue, CodeBuild, SageMaker, SSM, CloudFormation, Bedrock, AppRunner, and more—are synced automatically on first run and merged into the attack graph.

Atlas also includes techniques from Hacking the Cloud — exploitation paths (IMDS credential theft, Lambda SSRF, misconfigured resource policies, OIDC trust misconfig, Cognito self-signup, CloudFront/S3 takeover, PassRole abuse), post-exploitation persistence (GetFederationToken survival, CodeBuild runner persistence, rogue OIDC provider, IAM Roles Anywhere, S3 ACL persistence), and defense evasion (GuardDuty, CloudTrail). Operational tradecraft from Hacking the Cloud is in post_exploitation_operational.yaml.

This gives Atlas comprehensive, battle-tested coverage of real-world AWS privilege escalation techniques.


Contributing Red Team Techniques

We welcome contributions of new red team techniques. If you have attack paths, privilege escalation methods, or AWS abuse techniques you'd like to add to Atlas, please open an issue or submit a pull request. The planner and attack graph are designed to be extended—see src/atlas/planner/attack_graph.py and src/atlas/knowledge/data/api_detection_profiles.yaml for how techniques are modeled.


What is Atlas?

Atlas is a next-generation AWS cloud adversary emulation platform. It helps red teams and security researchers:

  • Discover attack paths from a given identity (recon + attack graph)
  • Plan multi-step privilege escalation chains
  • Simulate execution without making AWS API calls (BloodHound-style — mapping only, no execution)
  • Explain attack paths with AI-powered or template-based explanations

Features

Feature Description
pathfinding.cloud integration All 65+ verified IAM privilege escalation paths from pathfinding.cloud (Datadog) — auto-synced on first run
Hacking the Cloud techniques Exploitation, post-exploitation persistence, and defense evasion from hackingthe.cloud
BloodHound-style queries who-can-reach-admin, blast-radius, external-trusts, wildcards, privileged-principals, detection-map
Detection encyclopedia CloudTrail + GuardDuty profiles for each API action; atlas inspect shows detection scores
AI-powered explanations LLM-grounded explanations using verified pathfinding.cloud paths
k8scout-style GUI D3.js force-directed graph, Attack Chain Analyzer, findings, export
Access key decoder atlas inspect-key decodes AWS account ID from access key ID (offline)
Case management Save, list, and delete cases with atlas cases and atlas delete-case
Tiered permission recon Identity, policy, trust, guardrail, resource, and bruteforce tiers
Noise budget Stealth-aware planning with configurable detection cost limits

Requirements

  • Python 3.12+
  • AWS credentials configured (e.g. ~/.aws/credentials)

Installation

Install from PyPI (recommended):

pip install atlas-redteam

Or with pipx (isolated environment, no venv needed):

pipx install atlas-redteam

Update to latest version:

pip install --upgrade atlas-redteam
# or
pipx upgrade atlas-redteam

Note for maintainers: To publish new versions so users get updates, see docs/RELEASE.md.

For development (editable install):

git clone https://github.com/Haggag-22/Atlas.git
cd Atlas
pip install -e ".[dev]"

Quick Start

# Configure AWS profile
atlas config --profile my-profile --region us-east-1

# Run recon + planning (creates a case)
atlas plan --case mycase

# List attack paths and simulate
atlas simulate --case mycase --attack-path AP-01

# Explain an attack path
atlas explain --case mycase --attack-path AP-01

# Open the GUI (k8scout-style, port 8050)
atlas gui --case mycase

Note: If you see the old Streamlit UI (port 8501), you may have run streamlit run directly. Use atlas gui instead for the new D3.js-based interface.


Commands

Command Description
atlas config Set or show AWS profile and region
atlas plan Run reconnaissance + planning. Uses pathfinding.cloud (65+ verified IAM privesc paths) automatically—syncs on first run if needed.
atlas simulate Simulate an attack path (no AWS calls)
atlas cases List saved cases
atlas delete-case Delete a saved case
atlas explain Explain an attack path (AI or template)
atlas gui Open the k8scout-style web UI (D3.js graph, Attack Chain Analyzer)
atlas export-report Export case to JSON for offline GUI viewing
atlas query BloodHound-style queries: who-can-reach-admin, blast-radius, external-trusts, wildcards, privileged-principals, detection-map
atlas inspect Inspect detection profiles for API actions (CloudTrail + GuardDuty)
atlas inspect-key Decode AWS account ID from access key ID (offline)

Output Structure

output/<case>/
├── case.json           # Case metadata
├── plan/               # Recon + planning
│   ├── env_model.json
│   ├── attack_edges.json
│   ├── graph.json
│   ├── attack_paths.json
│   └── ...
├── sim/                # Simulation results (if run)
└── explanations.json   # Cached AI/template explanations

Attack Techniques

Atlas models techniques from pathfinding.cloud, Hacking the Cloud, and its own attack pattern registry, including:

  • IAM: Role assumption, access key creation, policy attachment, inline policy injection, PassRole abuse, trust policy modification, permissions boundary manipulation
  • EC2: PassRole via instance profile, userdata read/modify, EC2 Instance Connect, IMDS credential theft (Hacking the Cloud)
  • Lambda: PassRole, code/config injection, credential theft, SSRF-based cred theft (Hacking the Cloud)
  • ECS, Glue, CodeBuild, SageMaker: PassRole and service-specific escalation
  • SSM: Session Manager, tag-based enablement
  • CloudFormation, Bedrock, AppRunner: PassRole and resource abuse
  • S3: Bucket policy, object read/write, ACL persistence (Hacking the Cloud)
  • Cognito, OIDC, CloudFront: Self-signup, trust misconfig, domain takeover (Hacking the Cloud)
  • Post-exploitation: GetFederationToken survival, rogue OIDC provider, IAM Roles Anywhere (Hacking the Cloud)
  • Defense evasion: GuardDuty, CloudTrail evasion (Hacking the Cloud)

Detection costs and noise levels are derived from CloudTrail and GuardDuty profiles in src/atlas/knowledge/.


Discovered Resources

The recon engine collects the following resource types (configurable via recon.resource_types):

Resource Service Key Security Data
S3 Buckets S3 Bucket policies, Public Access Block
EC2 Instances EC2 Instance profiles, IMDS config, security groups
Lambda Functions Lambda Execution roles, resource policies, environment variables
RDS Instances RDS Public accessibility, encryption, IAM auth, snapshots
KMS Keys KMS Key policies, grants, rotation status
Secrets Manager Secrets Secrets Manager Resource policies, rotation, KMS encryption
SSM Parameters SSM Parameter types (SecureString), KMS key IDs
CloudFormation Stacks CloudFormation Stack roles, capabilities, outputs

License

MIT

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

atlas_redteam-2.0.0a1.dev53.tar.gz (333.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

atlas_redteam-2.0.0a1.dev53-py3-none-any.whl (337.6 kB view details)

Uploaded Python 3

File details

Details for the file atlas_redteam-2.0.0a1.dev53.tar.gz.

File metadata

  • Download URL: atlas_redteam-2.0.0a1.dev53.tar.gz
  • Upload date:
  • Size: 333.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for atlas_redteam-2.0.0a1.dev53.tar.gz
Algorithm Hash digest
SHA256 e870db7c17789202f365d278af07ab458774a7a19753d4dc27f47dffe0e273db
MD5 41691980b0a4652bca1688c6aa25fb49
BLAKE2b-256 20f30e110bba427a28068460c143733029d8c4c9e34f890141c62221c34667df

See more details on using hashes here.

Provenance

The following attestation bundles were made for atlas_redteam-2.0.0a1.dev53.tar.gz:

Publisher: publish.yml on Haggag-22/Atlas

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file atlas_redteam-2.0.0a1.dev53-py3-none-any.whl.

File metadata

File hashes

Hashes for atlas_redteam-2.0.0a1.dev53-py3-none-any.whl
Algorithm Hash digest
SHA256 78ec4c1e921edbc68d7a03ac0581eefe38b9482f584533e44278b58d1935e37d
MD5 2539c52ce07cb72e2b650dedc853ed5e
BLAKE2b-256 0db1d5600278b80ae128a411051f9f848fb566b9e7a77366d63593229685437e

See more details on using hashes here.

Provenance

The following attestation bundles were made for atlas_redteam-2.0.0a1.dev53-py3-none-any.whl:

Publisher: publish.yml on Haggag-22/Atlas

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page