All Projects → hehnope → Slurp

hehnope / Slurp

Licence: gpl-3.0
Evaluate the security of S3 buckets

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Slurp

Aws Toolkit Vscode
AWS Toolkit for Visual Studio Code, an extension for working with AWS services including AWS Lambda.
Stars: ✭ 823 (+349.73%)
Mutual labels:  aws, s3, hacktoberfest
Drone Cache
A Drone plugin for caching current workspace files between builds to reduce your build times
Stars: ✭ 194 (+6.01%)
Mutual labels:  aws, s3, hacktoberfest
Inertia
✈️ Effortless, self-hosted continuous deployment for small teams and projects
Stars: ✭ 133 (-27.32%)
Mutual labels:  aws, hacktoberfest
Scar
Deploy static websites in seconds - with HTTPS, a global CDN, and custom domains.
Stars: ✭ 1,715 (+837.16%)
Mutual labels:  aws, s3
Kafka Connect Storage Cloud
Kafka Connect suite of connectors for Cloud storage (Amazon S3)
Stars: ✭ 153 (-16.39%)
Mutual labels:  aws, s3
Serverless S3 Sync
A plugin to sync local directories and S3 prefixes for Serverless Framework ⚡️
Stars: ✭ 126 (-31.15%)
Mutual labels:  aws, s3
Django Init
Project template used at Fueled for scaffolding new Django based projects. 💫
Stars: ✭ 126 (-31.15%)
Mutual labels:  aws, hacktoberfest
0x4447 product s3 email
📫 A serverless email server on AWS using S3 and SES
Stars: ✭ 2,905 (+1487.43%)
Mutual labels:  aws, s3
Deploy Strapi On Aws
Deploying a Strapi API on AWS (EC2 & RDS & S3)
Stars: ✭ 121 (-33.88%)
Mutual labels:  aws, s3
Docker S3 Volume
Docker container with a data volume from s3.
Stars: ✭ 166 (-9.29%)
Mutual labels:  aws, s3
Terraform Aws Cloudfront S3 Cdn
Terraform module to easily provision CloudFront CDN backed by an S3 origin
Stars: ✭ 162 (-11.48%)
Mutual labels:  aws, s3
Python Aws S3
Demo of AWS S3 Walkthrough using Python
Stars: ✭ 169 (-7.65%)
Mutual labels:  aws, s3
Cash
HTTP response caching for Koa. Supports Redis, in-memory store, and more!
Stars: ✭ 122 (-33.33%)
Mutual labels:  aws, s3
Cluster.dev
Kubernetes-based Dev Environments with GitOps
Stars: ✭ 122 (-33.33%)
Mutual labels:  aws, hacktoberfest
Terraform Aws S3 Bucket
Terraform module which creates S3 bucket resources on AWS
Stars: ✭ 130 (-28.96%)
Mutual labels:  aws, s3
Aws Faq
Stars: ✭ 122 (-33.33%)
Mutual labels:  aws, hacktoberfest
Hubot Grafana
📈🤖 Query Grafana dashboards
Stars: ✭ 141 (-22.95%)
Mutual labels:  s3, hacktoberfest
Externalsecret Operator
An operator to fetch secrets from cloud services and inject them in Kubernetes
Stars: ✭ 177 (-3.28%)
Mutual labels:  aws, hacktoberfest
Serverless Architectures Aws
The code repository for the Serverless Architectures on AWS book
Stars: ✭ 120 (-34.43%)
Mutual labels:  aws, s3
Node Acme Lambda
Use AWS Lambda to manage SSL certificates for ACME providers like Let's Encrypt.
Stars: ✭ 120 (-34.43%)
Mutual labels:  aws, s3

slurp

slurp

Blackbox/whitebox S3 bucket enumerator

Overview

  • Credit to all the vendor packages that made this tool possible.
  • This is a security tool; it's meant for pen-testers and security professionals to perform audits of s3 buckets.

Features

  • Scan via domain(s); you can target a single domain or a list of domains
  • Scan via keyword(s); you can target a single keyword or a list of keywords
  • Scan via AWS credentials; you can target your own AWS account to see which buckets have been exposed
  • Colorized output for visual grep
  • Currently generates over 28,000 permutations per domain and keyword (thanks to @jakewarren and @random-robbie)
  • Punycode support for internationalized domains
  • Strong copyleft license (GPLv3)

Modes

There are two modes that this tool operates at; blackbox and whitebox mode. Whitebox mode (or internal) is significantly faster than blackbox (external) mode. Blackbox mode (or domain|keyword modes) operates by taking a permutation and scanning over the internet. This way is entirely dependent on the permutations list. You also cannot link (but can infer) which account the public bucket may belong to. Do not open issues asking how to figure this out; only amazon knows and the account holder.

internal mode works by using AWS credentials and scanning buckets that the account has access to. This method doesn't require the permutations list and is significantly faster. You also know which buckets the account belongs to (as you have to use AWS credentials to conduct the scan). In this mode, you are using the AWS API with credentials on a specific account that you own to see what is open. This method pulls all S3 buckets and checks Policy/ACL permissions. Note that, I will not provide support on how to use the AWS API. Your credentials should be in ~/.aws/credentials.

domain (external)

domain-scan

keyword (external)

keyword-scan

internal

internal-scan

Usage

  • slurp domain <-t|--target> example.com will enumerate the S3 domains for a specific target.
  • slurp keyword <-t|--target> linux,golang,python will enumerate S3 buckets based on those 3 key words.
  • slurp internal performs an internal scan using the AWS API.
  • slurp <domain|keyword> <-t|--target> example.com -g export the permutation list to a file; by default its ./generated. Use --generate_file to change the path/name.

What about slurp internal with different profiles?

It is entirely possible that you'll experience the following error:

ERRO[0003] NoCredentialProviders: no valid providers in chain. Deprecated.
	For verbose messaging see aws.Config.CredentialsChainVerboseErrors

This error can be thrown if you have profile based setup for ~/.aws/ (no default); you can get around this by running with AWS_PROFILE=x slurp internal. Amazons Named Profiles documentation sheds more light onto this issue.

Signals

Sending SIGHUP will output scanner stats to the terminal.

Installation

This project uses vgo; you can clone and go build or download from Releases section. Please do not open issues on why you cannot build the project; this project builds like any other project would in Go, if you cannot build then I strongly suggest you read the go spec.

Also, I do not regularly release binaries and the only binaries I'm including are linux/amd64. If you want mac/windows binaries, you'll have to build them yourself. Also note that this software is meant to run in Linux; I have no intention on building for Windows or Mac or supporting for those platforms. While you can build and run on those platforms no support will be provided.

Contributors

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].