GCPBucketBrute
Bucket Analyzer
Scripts to enumerate and analyze Google Storage bucket permissions
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
494 stars
8 watching
85 forks
Language: Python
last commit: over 1 year ago
Linked from 3 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| Tools for scanning and analyzing cloud storage bucket permissions | 134 |
| Automated tool to discover and analyze AWS S3 buckets owned by a specific domain. | 110 |
| A tool that identifies privilege escalation paths in cloud and saas applications by analyzing permissions across multiple platforms. | 673 |
| A collection of GCP IAM privilege escalation methods and their associated tools | 351 |
| Automates the process of discovering and analyzing interesting files in Amazon S3 buckets | 1,371 |
| A tool for analyzing and extracting data from stripped Go binaries | 957 |
| A tool to automatically enumerate permissions associated with AWS credentials | 1,105 |
| Analyzes codebases to extract characteristics and provides insights on their properties | 12 |
| Tools to identify publicly accessible S3 buckets by monitoring certificate transparency logs. | 1,756 |
| Automates enumeration of S3 buckets based on domain and keyword inputs | 13 |
| A tool that utilizes OpenAI to assist researchers in reverse engineering malware using Ghidra | 121 |
| A tool that collects and visualizes IAM permissions from Google Cloud Platform projects. | 50 |
| A set of Ghidra scripts for analyzing malware and extracting insights from shellcodes using various techniques such as hash matching and deobfuscation. | 91 |
| A tool to enumerate and interact with AWS S3 buckets | 71 |
| Emulates Google Cloud Bigtable for NoSQL storage | 21 |