{"id":13841772,"url":"https://github.com/jhaddix/awsScrape","last_synced_at":"2025-07-11T13:32:22.996Z","repository":{"id":143468318,"uuid":"615623824","full_name":"jhaddix/awsScrape","owner":"jhaddix","description":"A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.","archived":false,"fork":false,"pushed_at":"2024-01-10T22:54:54.000Z","size":27,"stargazers_count":225,"open_issues_count":2,"forks_count":29,"subscribers_count":6,"default_branch":"main","last_synced_at":"2024-11-09T19:50:21.506Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jhaddix.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-03-18T07:24:23.000Z","updated_at":"2024-11-05T04:47:22.000Z","dependencies_parsed_at":"2024-01-11T00:05:29.331Z","dependency_job_id":null,"html_url":"https://github.com/jhaddix/awsScrape","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jhaddix%2FawsScrape","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jhaddix%2FawsScrape/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jhaddix%2FawsScrape/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jhaddix%2FawsScrape/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jhaddix","download_url":"https://codeload.github.com/jhaddix/awsScrape/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225040340,"owners_count":17411460,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-04T17:01:20.859Z","updated_at":"2024-11-21T12:30:22.418Z","avatar_url":"https://github.com/jhaddix.png","language":"Go","readme":"# AWSScrape\nAWSScrape is a tool designed to scrape SSL certificates from all AWS IP ranges, searching for specific keywords in the certificates' Common Name (CN), Organization (O), and Organizational Unit (OU) fields.\n\n[![Twitter](https://img.shields.io/badge/twitter-@jhaddix-blue.svg)](https://twitter.com/jhaddix)\n## Installation\n\n1. Clone this repository:\n\n```\ngit clone https://github.com/jhaddix/awsscrape.git\ncd awsscrape\n```\n\n## Usage\n\nRun the script as follows:\n\n```\ngo run awsscrape.go -keyword=\u003cKEYWORD\u003e  \n```\n\n| Argument   | Description                                                                                                  |\n|------------|--------------------------------------------------------------------------------------------------------------|\n| -keyword    | Provide a single keyword to search for in SSL certificates |\n| -output | Provide an output file to store results within |\n| -randomize | When set, randomize the order in which IP addresses are checked |\n| -threads | Specify the number of concurrent threads (default 4) |\n| -timeout | Specify the number of seconds to timeout an SSL connection (default 1) |\n| -v -verbose | Enable verbose mode |\n| -w -wordlist | Specify a file of keywords to check for (on newlines) |\n\nThe script will parse the SSL certificates from the AWS IP ranges and display any matching your KEYWORD with the IP addresses of the matching certificates.\n\nPlease note that iterating through all AWS IP addresses and checking SSL certificates WILL take a long time to complete.\n\n=================================================================================================================================================\n\nDisclaimer: Usage without a customers permission may constitute a violation of AWS AUP:\n\n* https://aws.amazon.com/security/penetration-testing/\n* https://aws.amazon.com/aup/\n\nUse Responsibly\n","funding_links":[],"categories":["Go"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjhaddix%2FawsScrape","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjhaddix%2FawsScrape","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjhaddix%2FawsScrape/lists"}