/s3hunter

s3bucket_Hunter

Primary LanguageShell

s3hunter

This command-line tool assists security professionals, Penetration Tester, and BugBounty Hunter in identifying publicly accessible Amazon S3 buckets. It automates the information-gathering step When you are testing for the Cloud (AWS).

installation

permit to install.sh file : chmod +x install.sh s3hunter.sh then execute the file ./install.sh file it will start the installation process.

image

Usage

./s3hunter.sh it will start brute forcing and show the results on the terminal after that it will save the results in the output file.

Results

2024-06-04_12-35

2024-06-04_12-37

Disclaimer

This tool is intended for educational and ethical testing purposes only. Users are responsible for complying with all applicable laws and regulations.