Skip to content

CloudBrute

Cloud storage brute-force enumerator

Description

CloudBrute enumerates cloud resources (S3 buckets, Azure blobs, GCP storage) by brute-forcing naming patterns. It identifies misconfigured public cloud storage that may expose sensitive data. Supports AWS, Azure, GCP, and DigitalOcean.

Installation

BASH
go install github.com/0xsha/CloudBrute@latest

Basic Usage

BASH
# Enumerate cloud storage
CloudBrute -d target.com -k keyword -w wordlist.txt

# With specific provider
CloudBrute -d target.com -k target -w wordlist.txt -p aws

Advanced Usage

BASH
# All providers
CloudBrute -d target.com -k target -w wordlist.txt -p all

# Custom threads
CloudBrute -d target.com -k target -w wordlist.txt -t 50

# Output
CloudBrute -d target.com -k target -w wordlist.txt -o results.txt

# Multiple keywords
CloudBrute -d target.com -k "target,prod,dev,staging,backup" -w wordlist.txt -p all

Common Workflows

BASH
# Quick bucket enumeration
echo -e "dev\nstaging\nprod\nbackup\nassets\nuploads\ndata\nlogs\nconfig" > cloud_words.txt
CloudBrute -d target.com -k target -w cloud_words.txt -p all -t 30

# Check discovered buckets for public access
aws s3 ls s3://discovered-bucket --no-sign-request