Skip to content

An interactive GCP penetration testing tool for detecting misconfigurations, fetching zero-days, and analyzing security risks.

Notifications You must be signed in to change notification settings

wizard2773/gcp-pentest-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“Œ GCP Penetration Testing Toolkit

πŸš€ Overview

This tool automates penetration testing of Google Cloud Platform (GCP) environments. It detects zero-days, misconfigurations, privilege escalations, and credential leaks to help security teams enhance cloud security.


πŸ” Features

  • Zero-Day Attack Detection – Identifies risky API permissions and unknown vulnerabilities.
  • Threat Intelligence Integration – Fetches real-time CVEs and security alerts.
  • Misconfiguration Scanning – Detects public storage buckets, weak IAM roles, and exposed services.
  • Cloud Privilege Escalation – Finds ways to escalate access in GCP.
  • Exploit Framework – Loads external Python exploit modules dynamically.
  • Credential Dumping – Extracts exposed API keys, tokens, and secrets.
  • Evasion Techniques – Bypasses GCP logging and security monitoring.
  • Automated HTML Reporting – Saves findings in a structured security report.

πŸ“¦ Installation

πŸ”Ή Prerequisites

  • Python 3.8+
  • GCP Service Account Key (with security permissions)
  • Google Cloud SDK (for optional manual verification)

πŸ”Ή Setup

  1. Clone this repository:
    git clone https://github.com/<your-username>/gcp-pentest-toolkit.git
    cd gcp-pentest-toolkit
  2. Install dependencies:
    pip install -r requirements.txt
  3. Set up GCP credentials:
    • Place your service account key JSON in the project directory.
    • Export it for authentication:
      export GOOGLE_APPLICATION_CREDENTIALS="path/to/service-account.json"

πŸ› οΈ Usage

Run the tool interactively:

python gcp_pentest_toolkit.py

πŸ”Ή Main Menu Options

Option Description
1 Detect Zero-Day Attack Vectors
2 Fetch Latest Threat Intelligence
3 Load Exploit Plugins
4 Test Evasion Techniques
5 Run All Tests
6 Exit

πŸ“ Example Output

[*] Running Zero-Day Attack Vector Detection...
[!] Potentially risky APIs detected: ['cloudadmin.googleapis.com']

[*] Fetching latest threat intelligence...
[!] New CVE Found: CVE-2025-XXXX - Privilege escalation in Google IAM

[*] Loading exploit plugins...
[+] Found exploit module: exploit_storage_misconfig.py

[*] Testing evasion techniques...
[+] Evasion command executed: export GOOGLE_CLOUD_DISABLE_TELEMETRY=1

πŸ”Ή Report saved: gcp_pentest_report_YYYY-MM-DD_HH-MM-SS.html


πŸ“ž References & Threat Feeds


⚠️ Legal Disclaimer

🚨 This tool is intended for educational and authorized security testing only. Unauthorized use against GCP environments you do not own is illegal. Use responsibly.

About

An interactive GCP penetration testing tool for detecting misconfigurations, fetching zero-days, and analyzing security risks.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages