Pricing

Start free. Scale as your AWS environment grows.

Starter

Free

Try it out on a single AWS account

  • One account, one time
  • Basic attack graph
  • PDF report
  • Severity-ranked findings
  • Remediation guidance
  • Email support
  • No credit card required
Get Started

Pro

$19/account/mo

For teams serious about AWS security

  • Unlimited engagements
  • Multi-account scope
  • Real-time attack graph
  • Full report with remediation
  • Exportable attack paths
  • Scheduled scans
  • Team collaboration
Get Started

Enterprise

$49/account/mo

For organizations with complex AWS environments

  • Everything in Pro
  • AWS Organization-wide scans
  • Continuous monitoring and re-scans
  • MCP and API access
  • Custom guardrail templates
  • SSO integration
  • Dedicated support
Contact Us

Frequently Asked Questions

What does hackaws.cloud do?

hackaws.cloud runs an autonomous agent from our SaaS platform that uses your provided starting credentials to map every lateral movement and privilege escalation path in your AWS environment. It shows you your real attack surface and blast radius — what an attacker could actually reach.

Is it safe to run in my AWS account?

Yes. You configure guardrails before every engagement — scope boundaries, off-limits resources, and rules of engagement. The agent operates within your defined constraints and only uses AWS API calls. It does not exploit vulnerabilities, brute force credentials, or run destructive operations.

What kind of credentials do I need to provide?

You provide a starting point: an IAM access key pair, a session token, a Lambda function ARN, or an EC2 instance ID with an attached role. The agent begins from that foothold and discovers what paths are available.

How is this different from a vulnerability scanner?

Vulnerability scanners check for misconfigurations against a checklist. hackaws.cloud actually moves through your environment like an attacker would — assuming roles, chaining credentials, and discovering real attack paths. It shows you what is actually exploitable, not just what might be.

Does it work across multiple AWS accounts?

Yes. If the starting credentials can assume cross-account roles, the agent will follow those paths and map the blast radius across your entire AWS Organization.

What do I get at the end?

You get a live attack graph showing every path the agent discovered, plus a detailed report with findings, severity ratings, attack paths, and remediation recommendations. You can also watch the agent work in real time.