Packages and Binaries:

cloud-enum

cloud_enum enumerates public resources matching user requested keywords in public clouds:

  • Amazon Web Services:
    • Open S3 Buckets
    • Protected S3 Buckets
  • Microsoft Azure:
    • Storage Accounts
    • Open Blob Storage Containers
    • Hosted Databases
    • Virtual Machines
    • Web Apps
  • Google Cloud Platform:
    • Open GCP Buckets
    • Protected GCP Buckets
    • Google App Engine sites

Installed size: 66 KB
How to install: sudo apt install cloud-enum

  • bind9-host | host
  • python3
  • python3-dnspython
  • python3-requests
  • python3-requests-futures
cloud_enum
root@kali:~# cloud_enum -h
usage: cloud_enum.py [-h] (-k KEYWORD | -kf KEYFILE) [-m MUTATIONS] [-b BRUTE]
                     [-t THREADS] [-ns NAMESERVER] [-l LOGFILE]
                     [--disable-aws] [--disable-azure] [--disable-gcp] [-qs]

Multi-cloud enumeration utility. All hail OSINT!

optional arguments:
  -h, --help            show this help message and exit
  -k KEYWORD, --keyword KEYWORD
                        Keyword. Can use argument multiple times.
  -kf KEYFILE, --keyfile KEYFILE
                        Input file with a single keyword per line.
  -m MUTATIONS, --mutations MUTATIONS
                        Mutations. Default: enum_tools/fuzz.txt
  -b BRUTE, --brute BRUTE
                        List to brute-force Azure container names. Default:
                        enum_tools/fuzz.txt
  -t THREADS, --threads THREADS
                        Threads for HTTP brute-force. Default = 5
  -ns NAMESERVER, --nameserver NAMESERVER
                        DNS server to use in brute-force.
  -l LOGFILE, --logfile LOGFILE
                        Will APPEND found items to specified file.
  --disable-aws         Disable Amazon checks.
  --disable-azure       Disable Azure checks.
  --disable-gcp         Disable Google checks.
  -qs, --quickscan      Disable all mutations and second-level scans

Updated on: 2021-Nov-26