S3enum is a tool to enumerate a target’s Amazon S3 buckets. It is fast and leverages DNS instead of HTTP, which means that requests don’t hit AWS directly.
Go
go get github.com/koenrh/s3enum
Also Read – PythonAESObfuscate : Obfuscates a Python Script & Accompanying Shellcode
Usage
You need to specify the base name of the target (e.g. hackerone
), and a word list. You could either use the example wordlist.txt
file from this repository, or get a word list elsewhere. Optionally, you could specify the number of threads (defaults to 10).
$ s3enum –wordlist examples/wordlist.txt –suffixlist examples/suffixlist.txt –threads 10 hackerone
hackerone
hackerone-attachment
hackerone-attachments
hackerone-static
hackerone-upload
By default s3enum
will use the name server as specified in /etc/resolv.conf
. Alternatively, you could specify a different name server using the --nameserver
option. Besides, you could test multiple names at the same time.
s3enum \
–wordlist examples/wordlist.txt \
–suffixlist examples/suffixlist.txt \
–nameserver 1.1.1.1 \
hackerone h1 roflcopter
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…