Azure attack path reconnaissance for identifying privilege escalation paths, over-permissioned identities, and exploitable cloud misconfigurations.
Most Azure tools focus on inventory, configuration review, or compliance reporting.
AzureFox is built for offensive security and operator-first cloud triage:
- What can this identity actually do?
- Where can it pivot next?
- Which Azure path matters first?
pipx install azurefoxStart with the current Azure identity and the strongest visible control paths:
azurefox whoami
azurefox permissionsazurefox permissions
| principal | type | high-impact roles | scopes | operator signal | next review |
|---|---|---|---|---|---|
azurefox-lab-sp |
ServicePrincipal |
Owner |
1 |
Direct control visible; current foothold. | Check privesc for the direct abuse or escalation path. |
operator@lab.local |
User |
1 |
Direct control not confirmed. | Check rbac for the exact assignment evidence. |
AzureFox is not just listing Azure objects. It ranks the identities that matter, explains why they matter, and points to the next command to run.
- Identity-first, not just resource-first
- Focused on attack paths, not raw Azure data
- Output designed for operators who need to decide what matters next
| Section | Commands |
|---|---|
core |
inventory |
identity |
whoami, rbac, principals, permissions, privesc, role-trusts, lighthouse, auth-policies, managed-identities |
config |
arm-deployments, env-vars |
secrets |
keyvault, tokens-credentials |
resource |
automation, devops, acr, api-mgmt, databases, resource-trusts |
storage |
storage |
network |
nics, dns, endpoints, network-effective, network-ports |
compute |
workloads, app-services, functions, aks, vms, vmss, snapshots-disks |
| orchestration | chains |
Commands without links do not have a dedicated wiki source page in the repo yet.
Don't have an Azure environment handy? The companion repo AzureFox OpenTofu Proof Lab spins up a deliberately insecure Azure lab for demos, validation, and practice.
Use a disposable subscription you control. It is risky on purpose.
Shared flags like --tenant, --subscription, --output, --outdir, and --debug work before
or after the command.
These forms are equivalent:
azurefox dns --output json --outdir ./azurefox-demo
azurefox --output json --outdir ./azurefox-demo dnsUse azurefox <command> --help or azurefox help <command> for command-specific help.
AzureFox installs the live Azure runtime dependencies by default so pip install azurefox is ready
for real Azure command execution.
If you prefer an isolated virtual environment:
python -m venv .venv
# macOS/Linux
source .venv/bin/activate
# Windows PowerShell
# .venv\Scripts\Activate.ps1
pip install azurefoxFor local source-based development, use pip install -e '.[dev]'.
AzureFox is intended to work on macOS, Linux, and Windows. The command examples below use
portable relative paths like ./azurefox-demo; shell syntax mainly differs for virtualenv
activation and environment-variable export.
Live operator guidance is built into azurefox help and azurefox help <command>.
Longer-form planning and wiki-source material lives under
wiki/.
pip install azurefoxinstalls the normal operator profile from PyPI, including the Azure SDK dependencies used by the implemented live commandspip install -e .installs the same live Azure command profile from a local checkoutpip install -e '.[dev]'installs contributor tooling on top of the default live Azure dependencies; this is the normal repo development profile
- Azure CLI credential
- Environment/service principal credential
If you want web-based authentication, run az login first (outside AzureFox), then run AzureFox.
AzureFox does not currently launch its own browser auth flow.
Azure CLI example:
az login
az account set --subscription <subscription-id>
azurefox inventory --subscription <subscription-id>If you do not want to use web auth, set service principal environment variables and pass CLI flags for tenant/subscription targeting.
Environment credential + CLI options example:
# macOS/Linux
export AZURE_TENANT_ID=<tenant-id>
export AZURE_CLIENT_ID=<client-id>
export AZURE_CLIENT_SECRET=<client-secret>
export AZUREFOX_DEVOPS_ORG=<org-name> # only needed for the devops command
azurefox whoami --tenant <tenant-id> --subscription <subscription-id># Windows PowerShell
$env:AZURE_TENANT_ID="<tenant-id>"
$env:AZURE_CLIENT_ID="<client-id>"
$env:AZURE_CLIENT_SECRET="<client-secret>"
$env:AZUREFOX_DEVOPS_ORG="<org-name>" # only needed for the devops command
azurefox whoami --tenant <tenant-id> --subscription <subscription-id>AZUREFOX_DEVOPS_ORG is only needed when running the devops command. The identity used for
devops still needs access to the Azure DevOps organization, not just ARM access to the tenant or
subscription.
--output table(default)--output json--output csv
All commands write artifacts under <outdir>/:
-
loot/<command>.json -
json/<command>.json -
table/<command>.txt -
csv/<command>.csvArtifact intent: -
json/is the full structured command record. -
loot/is the smaller high-value handoff, focused on the top-ranked targets for quick operator follow-up and later chain-oriented workflows. -
table/andcsv/are convenience views rendered from the same underlying command result.
AzureFox keeps flat standalone commands and also supports grouped execution through chains.
For narrower current work:
- run the flat commands directly when you already know the lane you want
- use
chainswhen you want a higher-value grouped answer instead of every source command on its own
Current section mappings:
identity:whoami,rbac,principals,permissions,privesc,role-trusts,lighthouse,auth-policies,managed-identitiesconfig:arm-deployments,env-varssecrets:keyvault,tokens-credentialsresource:automation,devops,acr,api-mgmt,databases,resource-trustsstorage:storagenetwork:nics,dns,endpoints,network-effective,network-portscompute:workloads,app-services,functions,aks,vms,vmss,snapshots-diskscore:inventory
AzureFox supports generic and scoped help:
azurefox help
azurefox help identity
azurefox help permissions
azurefox dns --help
azurefox -h identity
azurefox -h permissionsCommand help includes ATT&CK cloud leads as investigation prompts, not proof that a technique occurred.
Help also points grouped follow-up toward chains where those presets exist.
For ad hoc demos or local testing, use a dedicated path like --outdir ./azurefox-demo so
artifacts do not pile up in the repo root.
Set AZUREFOX_FIXTURE_DIR to run against local fixture files rather than Azure APIs.
# macOS/Linux
AZUREFOX_FIXTURE_DIR=tests/fixtures/lab_tenant azurefox rbac --output json# Windows PowerShell
$env:AZUREFOX_FIXTURE_DIR="tests/fixtures/lab_tenant"
azurefox rbac --output jsonpip install -e '.[dev]'
ruff check .
pytestCI runs lint plus unit, contract, and smoke tests. Integration tests are opt-in.
AzureFox is inspired by CloudFox, created by Bishop Fox. The command model and operator workflow goals in this project are heavily shaped by CloudFox's approach to cloud situational awareness and attack-path-focused enumeration.
This project is an independent implementation and is not affiliated with or endorsed by Bishop Fox.
AzureFox is licensed under the MIT License to match CloudFox's licensing model. See LICENSE.
