{"id":13542353,"url":"https://github.com/JR0ch17/S3Cruze","last_synced_at":"2025-04-02T10:30:40.426Z","repository":{"id":50468020,"uuid":"96569748","full_name":"JR0ch17/S3Cruze","owner":"JR0ch17","description":"All-in-one AWS S3 bucket tool for pentesters.","archived":false,"fork":false,"pushed_at":"2019-02-16T07:36:18.000Z","size":41,"stargazers_count":70,"open_issues_count":0,"forks_count":26,"subscribers_count":3,"default_branch":"master","last_synced_at":"2024-11-03T08:34:51.819Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/JR0ch17.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2017-07-07T19:17:52.000Z","updated_at":"2024-08-12T19:31:09.000Z","dependencies_parsed_at":"2022-09-24T12:50:44.486Z","dependency_job_id":null,"html_url":"https://github.com/JR0ch17/S3Cruze","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/JR0ch17%2FS3Cruze","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/JR0ch17%2FS3Cruze/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/JR0ch17%2FS3Cruze/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/JR0ch17%2FS3Cruze/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/JR0ch17","download_url":"https://codeload.github.com/JR0ch17/S3Cruze/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246796751,"owners_count":20835438,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-01T10:01:05.320Z","updated_at":"2025-04-02T10:30:40.158Z","avatar_url":"https://github.com/JR0ch17.png","language":"Python","readme":"# S3Cruze\n[![Python |2.7](https://img.shields.io/badge/python-2.7-yellow.svg)](https://www.python.org/) [![Twitter](https://img.shields.io/badge/twitter-@JR0ch17-blue.svg)](https://twitter.com/JR0ch17)\n\nThis tool is based off of the Sandcastle projet from @yasinS. Using a word list, it will enumerate buckets and list files (if allowed). You can also choose to try to upload a test file, or attempt to view a bucket's ACL, policy, CORS configuration, replication configuration, website configuration and bucket location. You also have the option to check a single bucket that you have already found elsewhere. \n\n\n\n## AWS-CLI\n- For this tool to work properly, you need to have **AWS-CLI** installed (http://docs.aws.amazon.com/cli/latest/userguide/installing.html). - Once installed, you need to run `$ aws configure` to configure your AWS Access Keys.\n\n\n\n## How to use S3Cruze\n1. Clone this repo\n2. Run s3cruze.py with your target name. You can also specify your own dictionnary file if you'd like and you can also select if you want to try to upload a file or not. The default behavior will only enumerate buckets.\n\n```\nusage: s3cruze.py [-h] -t targetBucket [-f inputFile] [-u] [-d] [-a] [-p]\n                   [-c] [-r] [-w] [-l] [--all] (-b | -s)\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -t targetBucket, --target targetBucket\n                        Select a target bucket name (e.g. 'shopify')\n  -f inputFile, --file inputFile\n                        Select a bucket brute-forcing file (default: bucket-\n                        names.txt)\n  -u, --upload          File to upload will be automatically generated (e.g.\n                        'BugBounty-[######].txt')\n  -d, --delete          Delete file from bucket after uploading it\n  -a, --acl             View bucket ACL\n  -p, --policy          View bucket policy\n  -c, --cors            View bucket CORS configuration\n  -r, --replication     View bucket replication configuration\n  -w, --website         View bucket website configuration\n  -l, --location        View bucket location\n  --all                 View all bucket configuration\n  -b, --bruteforce      Bruteforce buckets names. By default it will try to\n                        list files from the buckets.\n  -s, --single          Check a single bucket only\n\n  \n```\n\n\n\n## Contributions\nI'm just beginning to code in Python so if you feel it could work better by coding it in a certain way, please feel free to create pull requests, it would be greatly appreciated. Honestly, please do. \n\nIf needed, I can also be reached via Twitter @JR0ch17.\n","funding_links":[],"categories":["Miscellaneous"],"sub_categories":["Buckets"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FJR0ch17%2FS3Cruze","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FJR0ch17%2FS3Cruze","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FJR0ch17%2FS3Cruze/lists"}