AWS Report – Tool For Analyzing Amazon Resources

AWS Report is a tool for analyzing amazon resources, let us have a look at some of features;

  • Search iam users based on creation date
  • Search buckets public
  • Search security group with inbound rule for 0.0.0.0/0
  • Search elastic ip dissociated
  • Search volumes available
  • Search AMIs with permission public
  • Search internet gateways detached

Also Read – nmapAutomator : A Script That You Can Run In The Background

Install requirements

pip3 install –user -r requirements.txt

Environment variables

IAM_MAX_ACCESS_KEY_AGE default is 60 days.

Usage

Usage: aws_report.py [OPTIONS]

Options:
–s3 Search buckets public in s3
–iam Search iam users based on creation date
–sg Search security groups with inbound rule 0.0.0.0
–elasticip Search elastic IP not associated
–volumes Search volumes available
–ami Search AMIs with permission public
–owner TEXT Defines the owner of the resources to be found
–igw Search internet gateways detached
–region TEXT Defines the region of resources
–help Show this message and exit.

Examples

python3 aws_report.py –s3
python3 aws_report.py –iam
python3 aws_report.py –owner 296193067842 –ami

Running In Docker

docker run -it -e AWS_ACCESS_KEY_ID=you-access-key -e AWS_SECRET_ACCESS_KEY=you-secret-key gmdutra/aws-report –s3

R K

Recent Posts

ROADTools: The Modern Azure AD Exploration Framework

ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…

3 days ago

How to Enumerate Microsoft 365 Groups Using PowerShell and Python

Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…

3 days ago

SeamlessPass: Using Kerberos Tickets to Access Microsoft 365

SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain…

4 days ago

PPLBlade: Advanced Memory Dumping and Obfuscation Tool

PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…

4 days ago

HikPwn : Simple Scanner For Hikvision Devices With Basic Vulnerability Scanning

HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…

4 days ago

Comments in Bash Scripts

What Are Bash Comments? Comments in Bash scripts, are notes in your code that the…

1 week ago