Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xbharath/slurp
A blazing fast & feature rich Amazon S3 bucket enumerator.
https://github.com/0xbharath/slurp
Last synced: about 2 months ago
JSON representation
A blazing fast & feature rich Amazon S3 bucket enumerator.
- Host: GitHub
- URL: https://github.com/0xbharath/slurp
- Owner: 0xbharath
- License: gpl-3.0
- Fork: true (gdraperi/slurp-1)
- Created: 2019-07-01T04:14:14.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2022-08-18T08:55:31.000Z (over 2 years ago)
- Last Synced: 2024-08-04T00:12:54.812Z (5 months ago)
- Language: Go
- Homepage:
- Size: 12.5 MB
- Stars: 91
- Watchers: 2
- Forks: 23
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- Awesome-Pentest - slurp - A blazing fast & feature rich Amazon S3 bucket enumerator. (AWS)
README
# slurp
Blackbox/whitebox S3 bucket enumerator## Overview
- Credit to all the vendor packages that made this tool possible.
- This is a security tool; it's meant for pen-testers and security professionals to perform audits of s3 buckets.### Features
- Scan via domain(s); you can target a single domain or a list of domains
- Scan via keyword(s); you can target a single keyword or a list of keywords
- Scan via AWS credentials; you can target your own AWS account to see which buckets have been exposed
- Colorized output for visual grep
- Currently generates over 28,000 permutations per domain and keyword (thanks to @jakewarren and @random-robbie)
- Punycode support for internationalized domains
- Strong copyleft license (GPLv3)## Modes
There are two modes that this tool operates at; blackbox and whitebox mode. Whitebox mode (or internal) is significantly faster than blackbox (external) mode.### Blackbox (external)
In this mode, you are using the permutations list to conduct scans. It will return false positives and there is **no way to link the buckets to an actual aws account!** Do not open issues asking how to do this.#### Domain
![domain-scan](./docs/domain.png)#### Keywords
![keyword-scan](./docs/keywords.png)### Whitebox (internal)
In this mode, you are using the AWS API **with credentials** on a specific account *that you own* to see what is open. This method pulls all S3 buckets and checks Policy/ACL permissions. Note that, I will not provide support on how to use the AWS API. Your credentials should be in `~/.aws/credentials`.#### internal
![internal-scan](./docs/internal.png)## Usage
- `slurp domain <-t|--target> example.com` will enumerate the S3 domains for a specific target.
- `slurp keyword <-t|--target> linux,golang,python` will enumerate S3 buckets based on those 3 key words.
- `slurp internal` performs an internal scan using the AWS API.## Installation
This project uses `vgo`; you can clone and `go build` or download from Releases section. **Please do not open issues on why you cannot build the project**; this project builds like any other project would in Go, if you cannot build then I strongly suggest you read the [go spec](https://golang.org/ref/spec).Also, the only binaries I'm including are `linux/amd64`; if you want mac/windows binaries, build it yourself.