This command-line tool assists security professionals, Penetration Tester, and BugBounty Hunter in identifying publicly accessible Amazon S3 buckets. It automates the information-gathering step When you are testing for the Cloud (AWS).
permit to install.sh file : chmod +x install.sh s3hunter.sh then execute the file ./install.sh file it will start the installation process.
./s3hunter.sh it will start brute forcing and show the results on the terminal after that it will save the results in the output file.
This tool is intended for educational and ethical testing purposes only. Users are responsible for complying with all applicable laws and regulations.