GCP pentesting guide (blog post)
1. sa_enum.py
Run this script on a GCP compute instance to enumerate any SAs that exist on the Instance.
The results will vary depending on the account's permissions.
2. list_folders.py
3. list_projects.py
The scripts accept as input a single folder ID or a file containing one folder ID per line.
The result outputs the folders nested under the parent folder and the projects that are not under any folder.
3. project_assets_enum.py
Enumerates various assets within a GCP project, useful for understanding the environment you are in. Run it localy (requires gcloud) or in cloud compute instance, requires authentication & authorization. The output and results are based on the user’s permissions. For more details, check out the pentesting guide
The script checks if an access token is active or expired. If the token is valid it creates a gcloud configuration based on that token.