Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hupe1980/awsrecon
Tool for reconnaissance of AWS cloud environments
https://github.com/hupe1980/awsrecon
audit aws aws-security blue-team cloud-security cybersecurity pentesting-tools reconnaissance red-team
Last synced: 7 days ago
JSON representation
Tool for reconnaissance of AWS cloud environments
- Host: GitHub
- URL: https://github.com/hupe1980/awsrecon
- Owner: hupe1980
- License: mit
- Created: 2022-10-21T22:33:04.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2023-10-09T18:31:13.000Z (about 1 year ago)
- Last Synced: 2024-11-01T12:35:44.264Z (14 days ago)
- Topics: audit, aws, aws-security, blue-team, cloud-security, cybersecurity, pentesting-tools, reconnaissance, red-team
- Language: Go
- Homepage:
- Size: 1.45 MB
- Stars: 13
- Watchers: 2
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# AWSrecon
![Build Status](https://github.com/hupe1980/awsrecon/workflows/build/badge.svg)
[![Go Reference](https://pkg.go.dev/badge/github.com/hupe1980/awsrecon.svg)](https://pkg.go.dev/github.com/hupe1980/awsrecon)
> AWSrecon is a tool for reconnaissance AWS cloud environments. It helps security professionals find possible vulnerabilities and exploitable attack paths in AWS cloud infrastructures.## Features
- Enumerates internal/external endpoints as attacking starting point or for lateral movement
- Mines secrets in envs, tags, stacks and more
- Detects dangling dns entries (subdomain takeover)
- Lists potentially mountable file systems
- Lists iam policies that have the potential for privilege escalation or data exfiltration (coming soon)
- Gives hints for further investigations
- ...## Installing
You can install the pre-compiled binary in several different ways### homebrew tap:
```bash
brew tap hupe1980/awsrecon
brew install awsrecon
```
### scoop:
```bash
scoop bucket add awsrecon https://github.com/hupe1980/awsrecon-bucket.git
scoop install awsrecon
```### deb/rpm/apk:
Download the .deb, .rpm or .apk from the [releases page](https://github.com/hupe1980/awsrecon/releases) and install them with the appropriate tools.### manually:
Download the pre-compiled binaries from the [releases page](https://github.com/hupe1980/awsrecon/releases) and copy to the desired location.## How to use
```
Usage:
awsrecon [command]Available Commands:
access-keys Enumerate iam access-keys
buckets Enumerate s3 buckets
completion Generate the autocompletion script for the specified shell
download-iam Download iam definitions
endpoints Enumerate endpoints
envs Enumerate environment variables
filesystems Enumerate filesystems
functions Enumerate lambda functions
help Help about any command
instances Enumerate ec2 instances
logs Enumerate cloudwatch logs
principals Enumerate iam principals
records Enumerate dns records
repos Enumerate codecommit repositories
role-trusts Enumerate iam role-trusts
secrets Enumerate secrets
stacks Enumerate cloudformation stacks
tags Enumerate tagsFlags:
-h, --help help for awsrecon
-o, --output string output filename
--profile string AWS profile
--region strings AWS regions (default all aws regions)
-A, --user-agent string user-agent to use (default "awsrecon")
-v, --version version for awsreconUse "awsrecon [command] --help" for more information about a command.
```## Available Commands
|Name|Description
|-|-
|[access-keys](/docs/access-keys.md)|Enumerate iam access-keys|
|[buckets](/docs/buckets.md)|Enumerate s3 buckets|
|[endpoints](/docs/endpoints.md)|Enumerate endpoints|
|[envs](/docs/envs.md)|Enumerate environment variables|
|[filesystems](/docs/filesystems.md)|Enumerate filesystems|
|[functions](/docs/functions.md)|Enumerate lambda functions|
|[instances](/docs/instances.md)|Enumerate ec2 instances|
|[logs](/docs/logs.md)|Enumerate cloudwatch logs|
|[principals](/docs/principals.md)|Enumerate iam principals|
|[records](/docs/records.md)|Enumerate dns records|
|[repos](/docs/repos.md)|Enumerate codecommit repos|
|[role-trusts](/docs/role-trusts.md)|Enumerate iam role-trusts|
|[secrets](/docs/secrets.md)|Enumerate secrets|
|[stacks](/docs/stacks.md)|Enumerate cloudformation stacks|
|[tags](/docs/tags.md)|Enumerate tags|## License
[MIT](LICENCE)