CloudToolKit is an adversary simulation and validation toolkit for assessing the effectiveness of CSPM, CNAPP, and related cloud detection and investigation platforms in authorized environments.
Overview
CloudToolKit helps defenders reproduce realistic cloud security scenarios in owned labs, approved internal subscriptions, and explicitly authorized customer environments. It is designed for defensive validation through cloud asset inventory, identity and privilege abuse checks, suspicious resource activity review, and authorized instance command checks that generate realistic telemetry for detection and investigation testing.
Why This Project Exists
Enterprise cloud security teams need repeatable validation workflows that answer practical questions:
- Can the platform detect suspicious cloud behavior in an authorized test environment?
- Does the telemetry preserve enough context for investigation?
- Can analysts correlate identity activity, resource changes, and control failures?
- Where are the visibility gaps across CSPM, CNAPP, and related cloud security tooling?
What It Validates
CloudToolKit is intended to help defenders verify:
- platform coverage across CSPM, CNAPP, and related cloud detection and investigation tooling
- telemetry quality for triage, investigation, and root-cause analysis
- investigation readiness across identity, compute, storage, and database activity
- control visibility gaps that require tuning, additional telemetry, or compensating detections
Features
- Multi-Cloud Coverage - Alibaba, Tencent, Huawei, AWS, Azure, GCP, Volcengine, and JDCloud
- Cloud Asset Inventory - Hosts, databases, storage buckets, domains, IAM users, and related cloud resources
- Defender-Side Validation Payloads -
iam-user-check, bucket-check, instance-cmd-check, event-check, and rds-account-check
- Interactive CLI - Tab completion, session management, and credential caching
- Lightweight Provider Clients - AWS, Azure, Tencent, Huawei, and Alibaba integrations are being gradually decoupled from heavy official SDK paths
Use Cases
- storage exposure checks in authorized environments
- IAM lifecycle checks for identity telemetry and alert validation
- instance execution telemetry checks for detection and investigation workflows
- RDS account validation for database visibility and control verification
- cross-signal investigation testing across identity, compute, storage, and database activity
Example Validation Workflows
- Use
cloudlist in an authorized environment to verify whether a CSPM or CNAPP accurately discovers compute, storage, identity, database, and DNS resources.
- Use
iam-user-check to create or remove a test IAM user and validate identity telemetry, alerting, and persistence detection coverage.
- Use
instance-cmd-check to generate telemetry for command execution, process correlation, and investigation workflows on a test instance.
- Use
event-check to review cloud security events and suspicious resource operations for investigation context, enrichment quality, and timeline reconstruction.
- Use
rds-account-check to provision read-only RDS access in an authorized environment to validate database visibility, control coverage, and investigation readiness.
Supported Capabilities
| Provider |
Inventory Coverage |
Validation Payloads |
| Alibaba Cloud |
ECS, OSS, RAM, RDS, DNS, SLS, SMS |
iam-user-check, bucket-check, instance-cmd-check, event-check, rds-account-check |
| Tencent Cloud |
CVM, Lighthouse, COS, CAM, CDB, DNSPod |
iam-user-check, bucket-check, instance-cmd-check |
| Huawei Cloud |
ECS, OBS, IAM, RDS |
iam-user-check, bucket-check |
| AWS |
EC2, S3, IAM |
iam-user-check, bucket-check |
| Azure |
Virtual Machines, Blob Storage |
- |
| GCP |
Compute Engine, Cloud DNS, IAM |
- |
| Volcengine |
ECS, IAM, TOS, RDS, DNS |
iam-user-check, bucket-check, instance-cmd-check |
| JDCloud |
VM, IAM, OSS |
- |
Quick Start
# Download from releases or build from source
go build --ldflags "-s -w" -trimpath -o ctk cmd/main.go
# Run interactive console
./ctk
Responsible Use
CloudToolKit is intended only for owned environments, lab environments, approved internal subscriptions, and explicitly authorized customer environments. It is designed to help defenders verify detection coverage, telemetry quality, investigation workflows, and control effectiveness. It is not intended for unauthorized access, third-party abuse, or covert real-world intrusion activity.
Non-Goals
CloudToolKit is not positioned as:
- an unauthorized offensive toolkit
- a stealth or bypass framework
- a weaponized intrusion utility
- guidance for abuse against third-party environments
Documentation
See Wiki for detailed usage.
Acknowledgements