An Automated S3-compatible Bucket Inspector
Description • Installation • Features • Documentation • Acknowledgements
The tool can scan for buckets deployed on Amazon Web Services (AWS), Google Cloud Storage (GCS), DigitalOcean Spaces and even custom domains/URLs which could be connected to these platforms. It returns the output in a JSON format, thus enabling users to parse it according to their liking or forward it to any other tool for further processing.
BucketLoot comes with a guest mode by default, which means a user doesn't needs to specify any API tokens / Access Keys initially in order to run the scan. The tool will scrape a maximum of 1000 files that are returned in the XML response and if the storage bucket contains more than 1000 entries which the user would like to run the scanner on, they can provide platform credentials to run a complete scan. If you'd like to know more about the tool, make sure to check out our blog.
You can install BucketLoot using either of these methods:
go install github.com/redhuntlabs/bucketloot/cmd/bucketloot@latest# Clone the repository
git clone https://github.com/redhuntlabs/BucketLoot.git
cd BucketLoot
# Install the tool
go install ./cmd/bucketlootAfter installation, you can run bucketloot from anywhere in your terminal!
# Basic usage
bucketloot https://example-bucket.s3.amazonaws.com
# With options
bucketloot -slow -notify https://example-bucket.s3.amazonaws.com
# Search for keywords
bucketloot -search "password" https://example-bucket.s3.amazonaws.com
# Save output
bucketloot -save results.json https://example-bucket.s3.amazonaws.com
# Full scan mode (requires credentials.json)
bucketloot -full https://example-bucket.s3.amazonaws.comFor notifications and full scan mode, you'll need to create notifyConfig.json and credentials.json in your working directory. See the documentation for more details.
To know more about our Attack Surface Management platform, check out NVADR.
