Skip to content

Cloud Bucket Hunter Tool: A bash script that generates a list of potentiaal targets for cloud bucket hunting, helping security researchers & Bug hunters identify vulnerable buckets on different cloud services.

License

Notifications You must be signed in to change notification settings

povzayd/bucketgen

Folders and files

NameName
Last commit message
Last commit date

Latest commit

d0c544d Β· Mar 23, 2025

History

5 Commits
Mar 23, 2025
Mar 23, 2025
Mar 23, 2025

Repository files navigation

πŸ•΅οΈβ€β™‚οΈ Bug Hunter's Cloud Bucket Finder

πŸš€ About This Tool

This is a simple yet powerful Bash script designed for bug bounty hunters and security researchers. The tool takes a list of subdomains as input and a keyword, then generates various permutations that can be used to identify cloud storage buckets across different cloud providers (AWS S3, Google Cloud Storage, DigitalOcean Spaces, etc.).

🎯 Features

βœ… Reads subdomains from a file πŸ“‚
βœ… Takes a keyword as input πŸ”‘
βœ… Generates different permutations to aid in bucket discovery πŸ—οΈ
βœ… Saves the output in a text file for further use πŸ“œ
βœ… Helps in identifying misconfigured cloud storage buckets πŸ›‘

πŸ“Œ How to Use

1️⃣ Clone the repository

 git clone https://github.com/povzayd/bucketgen.git
 cd bucketgen

2️⃣ Make the script executable

 chmod +x bucketgen.sh

3️⃣ Run the script

 ./bucketgen.sh

4️⃣ Provide Inputs

  • Enter the path to your subdomain file (e.g., subdomains.txt)
  • Enter the keyword to be used for permutations (e.g., backup, test, storage)

5️⃣ Check the output file

  • The output will be saved in a file named <keyword>.txt
  • Use this file to search for potential misconfigured cloud storage buckets

πŸ“– Example Usage

Input:

subdomains.txt

example
myapp
company

Keyword:

storage

Output (storage.txt):

storage-example
storage_example
example-storage
example_storage
storage-myapp
storage_myapp
myapp-storage
myapp_storage
storage-company
storage_company
company-storage
company_storage

🎯 Next Steps

  • Use the output file to brute-force cloud storage services
  • Try different keywords (e.g., test, dev, backup, logs)
  • Use tools like ffuf or gau to find exposed bucket URLs

⚠️ Disclaimer

This tool is intended for educational and ethical security testing purposes only. Unauthorized access to data or systems you do not own is illegal. Always obtain proper permission before conducting security research.

Happy Hacking! πŸžπŸ’»

About

Cloud Bucket Hunter Tool: A bash script that generates a list of potentiaal targets for cloud bucket hunting, helping security researchers & Bug hunters identify vulnerable buckets on different cloud services.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages