An open API service indexing awesome lists of open source software.

https://github.com/povzayd/bucketgen

Cloud Bucket Hunter Tool: A bash script that generates a list of potentiaal targets for cloud bucket hunting, helping security researchers & Bug hunters identify vulnerable buckets on different cloud services.
https://github.com/povzayd/bucketgen

aws aws-s3 awssecurity azure bugbounty-tool cloud cloudpentest cloudsecurity cloudstorage google-cloud

Last synced: about 1 month ago
JSON representation

Cloud Bucket Hunter Tool: A bash script that generates a list of potentiaal targets for cloud bucket hunting, helping security researchers & Bug hunters identify vulnerable buckets on different cloud services.

Awesome Lists containing this project

README

        

# 🕵️‍♂️ Bug Hunter's Cloud Bucket Finder

## 🚀 About This Tool
This is a simple yet powerful Bash script designed for **bug bounty hunters** and **security researchers**. The tool takes a list of **subdomains** as input and a **keyword**, then generates various permutations that can be used to identify **cloud storage buckets** across different cloud providers (AWS S3, Google Cloud Storage, DigitalOcean Spaces, etc.).

## 🎯 Features
✅ Reads subdomains from a file 📂
✅ Takes a **keyword** as input 🔑
✅ Generates different **permutations** to aid in bucket discovery 🏗️
✅ Saves the output in a text file for further use 📜
✅ Helps in identifying misconfigured cloud storage buckets 🛑

## 📌 How to Use

1️⃣ **Clone the repository**
```bash
git clone https://github.com/povzayd/bucketgen.git
cd bucketgen
```

2️⃣ **Make the script executable**
```bash
chmod +x bucketgen.sh
```

3️⃣ **Run the script**
```bash
./bucketgen.sh
```

4️⃣ **Provide Inputs**
- Enter the path to your subdomain file (e.g., `subdomains.txt`)
- Enter the keyword to be used for permutations (e.g., `backup`, `test`, `storage`)

5️⃣ **Check the output file**
- The output will be saved in a file named `.txt`
- Use this file to search for potential **misconfigured cloud storage buckets**

## 📖 Example Usage
### Input:
#### `subdomains.txt`
```
example
myapp
company
```
### Keyword:
```
storage
```
### Output (`storage.txt`):
```
storage-example
storage_example
example-storage
example_storage
storage-myapp
storage_myapp
myapp-storage
myapp_storage
storage-company
storage_company
company-storage
company_storage
```

## 🎯 Next Steps
- Use the output file to **brute-force cloud storage services**
- Try different **keywords** (e.g., `test`, `dev`, `backup`, `logs`)
- Use tools like `ffuf` or `gau` to find exposed bucket URLs

## ⚠️ Disclaimer
This tool is intended for **educational and ethical security testing purposes** only. Unauthorized access to data or systems you do not own is **illegal**. Always obtain **proper permission** before conducting security research.

Happy Hacking! 🐞💻