View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0009471 | Kali Linux | New Tool Requests | public | 2025-12-30 06:03 | 2026-03-26 10:20 |
| Reporter | umair | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | new | Resolution | open | ||
| Summary | 0009471: BucketLoot - An Automated S3-compatible Bucket Inspector | ||||
| Description | BucketLoot is an automated S3-compatible Bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text. The tool can scan for buckets deployed on Amazon Web Services (AWS), Google Cloud Storage (GCS), DigitalOcean Spaces and even custom domains/URLs which could be connected to these platforms. It returns the output in a JSON format, thus enabling users to parse it according to their liking or forward it to any other tool for further processing. BucketLoot comes with a guest mode by default, which means a user doesn't needs to specify any API tokens / Access Keys initially in order to run the scan. The tool will scrape a maximum of 1000 files that are returned in the XML response and if the storage bucket contains more than 1000 entries which the user would like to run the scanner on, they can provide platform credentials to run a complete scan. If you'd like to know more about the tool please refer to this blog: https://redhuntlabs.com/blog/introducing-bucketloot-an-automated-cloud-bucket-inspector/ . [Github] - https://github.com/redhuntlabs/BucketLoot | ||||
| Attached Files | |||||
|
This tool is currently taught as part of the CEH v13 Practical certification ++ AFAIK is also being used by several companies in their automation pipelines. Happy to assist with any questions you may have. |
|
|
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will be for us): [Name] - The name of the tool [Update and/or dependency checking] - Does the tool have an auto update feature? Can it be disabled? Does it check for dependencies? Can it be disabled? [Programming language] - What is the code written in? What utilities are used? [Missing] - Are there any dependencies that are missing? [Kaboxer] - Is this tool a candidate for Kaboxer? [System-wide installation] - Does the tool support system-wide installation? [How to use] - What are some basic commands/functions to demonstrate it? |
|