{"id":24479,"date":"2022-05-20T12:54:10","date_gmt":"2022-05-20T12:54:10","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=24479"},"modified":"2022-05-20T12:54:12","modified_gmt":"2022-05-20T12:54:12","slug":"slyther","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/slyther\/","title":{"rendered":"Slyther : AWS Security Tool"},"content":{"rendered":"\n<p><strong>Slyther<\/strong> is AWS Security tool to check read\/write\/delete access for S3 buckets.<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Requirements<\/h2>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>aws-cli<\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Installation<\/h2>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>pip3 install -r requirements.txt<\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Usage example<\/h2>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python3 slyther.py -b flaws.cloud<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/iamavu\/Slyther\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Requirements aws-cli Installation pip3 install -r requirements.txt Usage example python3 slyther.py -b flaws.cloud<\/p>\n","protected":false},"author":4,"featured_media":24487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[305,3028,5135],"class_list":["post-24479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-aws","tag-security-tool","tag-slyther"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022<\/title>\n<meta name=\"description\" content=\"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/slyther\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022\" \/>\n<meta property=\"og:description\" content=\"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/slyther\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T12:54:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-20T12:54:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Slyther : AWS Security Tool\",\"datePublished\":\"2022-05-20T12:54:10+00:00\",\"dateModified\":\"2022-05-20T12:54:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/\"},\"wordCount\":35,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\",\"keywords\":[\"AWS\",\"Security Tool\",\"Slyther\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/slyther\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/slyther\/\",\"name\":\"Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\",\"datePublished\":\"2022-05-20T12:54:10+00:00\",\"dateModified\":\"2022-05-20T12:54:12+00:00\",\"description\":\"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/slyther\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022","description":"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/slyther\/","og_locale":"en_US","og_type":"article","og_title":"Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022","og_description":"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.","og_url":"https:\/\/kalilinuxtutorials.com\/slyther\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-05-20T12:54:10+00:00","article_modified_time":"2022-05-20T12:54:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/slyther\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/slyther\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Slyther : AWS Security Tool","datePublished":"2022-05-20T12:54:10+00:00","dateModified":"2022-05-20T12:54:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/slyther\/"},"wordCount":35,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","keywords":["AWS","Security Tool","Slyther"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/slyther\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/slyther\/","url":"https:\/\/kalilinuxtutorials.com\/slyther\/","name":"Slyther : AWS Security Tool !!! Kali Linux Tutorials 2022","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","datePublished":"2022-05-20T12:54:10+00:00","dateModified":"2022-05-20T12:54:12+00:00","description":"Slyther is AWS Security tool to check read\/write\/delete access for S3 buckets. Added option to check if aws-cli is installed or not.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/slyther\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/slyther\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-ftbwWJa2DYf2LlrZ4ije5NuTNeoXDzMcDwFgcFQCiVzErMTzptlqvEXSemCZrMpO8HUbv5PglYW4IyoSIIjQ64XrDC_kVIh3lTLPOTqqXYXIBYlPlY_nyPqSb6iMs8DWTFclnHSRzuuAk0Kx8JMqtQ4EatunrMYh2e_YZqMUOrPlCYj75ljSu4co\/s728\/159243882-af73d89f-2978-48bc-a29c-2476041cbdc9.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2002,"url":"https:\/\/kalilinuxtutorials.com\/scout2-security-auditing-aws\/","url_meta":{"origin":24479,"position":0},"title":"Scout2 &#8211; Security Auditing Tool For AWS Environments","author":"R K","date":"July 23, 2018","format":false,"excerpt":"Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual inspection and highlights high-risk areas automatically. Rather than pouring through dozens of pages on the web, Scout2 supplies a clear view of the attack surface automatically.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6463,"url":"https:\/\/kalilinuxtutorials.com\/mondoo-security-vulnerability-risk-management\/","url_meta":{"origin":24479,"position":1},"title":"Mondoo : Native Security &#038; Vulnerability Risk Management","author":"R K","date":"September 10, 2019","format":false,"excerpt":"Mondoo Cloud is a native security & vulnerability risk management. Quick Start Installing Workstation export MONDOO_REGISTRATION_TOKEN='changeme' curl -sSL http:\/\/mondoo.io\/download.sh | bash Service export MONDOO_REGISTRATION_TOKEN='changeme' curl -sSL http:\/\/mondoo.io\/install.sh | bash For other installation methods, have a look at our\u00a0documentation. Run a scan: # scan a docker image from remote registry mondoo\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36574,"url":"https:\/\/kalilinuxtutorials.com\/aws-cobalt-redirector\/","url_meta":{"origin":24479,"position":2},"title":"AWS Cobalt Redirector : Streamlining Red Team Operations With Automated C2 Infrastructure","author":"Varshini","date":"February 20, 2025","format":false,"excerpt":"The AWS Cobalt Redirector is a tool designed to streamline the deployment of a command-and-control (C2) infrastructure for red team operations using AWS services. It leverages Terraform and Ansible for automation and integrates AWS resources like CloudFront, Lambda, and EC2 to create a robust redirector setup. Functionality The AWS Cobalt\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AWS-Cobalt-Redirector.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24160,"url":"https:\/\/kalilinuxtutorials.com\/s3sec\/","url_meta":{"origin":24479,"position":3},"title":"S3Sec : Check AWS S3 Instances For Read\/Write\/Delete Access","author":"R K","date":"May 2, 2022","format":false,"excerpt":"S3Sec tool was developed to quickly test a list of s3 buckets for public read, write and delete access for the purposes of penetration testing on bug bounty programs. Installation Clone the git repo onto your machine: git clone https:\/\/github.com\/0xmoot\/s3sec Usage Check a single S3 instance: echo \"test-instance.s3.amazonaws.com\" | python3\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilLU7VLYN0tnJQcsvxNGhLu6EL3v7FND_JAV3p2Fteh8bhSGkaACpiEoNa4IKXxAjHbt_A4OKDwO2As9-RE8Po-f3AhQ26mMX63d1jD6fmfgEUB7bKBHig_d9iKCjcVEXYHMQ_nfJ0gGKvWiqRmQZSFiRMOrb8a3oUT03CDTYiYFkWOd9QZ-j-F1n4\/s728\/68747470733a2f2f30786d6f6f742e636f6d2f6769742f73637265656e73686f74732f7333736563322e706e67%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilLU7VLYN0tnJQcsvxNGhLu6EL3v7FND_JAV3p2Fteh8bhSGkaACpiEoNa4IKXxAjHbt_A4OKDwO2As9-RE8Po-f3AhQ26mMX63d1jD6fmfgEUB7bKBHig_d9iKCjcVEXYHMQ_nfJ0gGKvWiqRmQZSFiRMOrb8a3oUT03CDTYiYFkWOd9QZ-j-F1n4\/s728\/68747470733a2f2f30786d6f6f742e636f6d2f6769742f73637265656e73686f74732f7333736563322e706e67%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilLU7VLYN0tnJQcsvxNGhLu6EL3v7FND_JAV3p2Fteh8bhSGkaACpiEoNa4IKXxAjHbt_A4OKDwO2As9-RE8Po-f3AhQ26mMX63d1jD6fmfgEUB7bKBHig_d9iKCjcVEXYHMQ_nfJ0gGKvWiqRmQZSFiRMOrb8a3oUT03CDTYiYFkWOd9QZ-j-F1n4\/s728\/68747470733a2f2f30786d6f6f742e636f6d2f6769742f73637265656e73686f74732f7333736563322e706e67%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilLU7VLYN0tnJQcsvxNGhLu6EL3v7FND_JAV3p2Fteh8bhSGkaACpiEoNa4IKXxAjHbt_A4OKDwO2As9-RE8Po-f3AhQ26mMX63d1jD6fmfgEUB7bKBHig_d9iKCjcVEXYHMQ_nfJ0gGKvWiqRmQZSFiRMOrb8a3oUT03CDTYiYFkWOd9QZ-j-F1n4\/s728\/68747470733a2f2f30786d6f6f742e636f6d2f6769742f73637265656e73686f74732f7333736563322e706e67%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5719,"url":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","url_meta":{"origin":24479,"position":4},"title":"Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services","author":"R K","date":"July 14, 2019","format":false,"excerpt":"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts of your infrastructure and prepare your AWS account for security audit. Installation Currently it does not support any package managers, but the work\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35301,"url":"https:\/\/kalilinuxtutorials.com\/trailshark\/","url_meta":{"origin":24479,"position":5},"title":"TrailShark : Revolutionizing AWS CloudTrail Analysis With Wireshark Integration","author":"Varshini","date":"November 27, 2024","format":false,"excerpt":"The TrailShark Capture Utility seamlessly integrates with Wireshark, facilitating the capture of AWS CloudTrail logs directly into Wireshark for near-real-time analysis. This tool can be used for debugging AWS API calls and played a pivotal role in our \"Bucket Monopoly Research\" project. By leveraging this utility, we were able to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgoCwSePlNmJh_CFYEAoBYURHlAainxMBsvOcL_VWn4ZwB_a99k93Jdxl1uJu3Y8u0VxrGBUyTT8CwsWaultLLP7ZWwwORZn6JPzn_-5AOYOZX1AzwCCwOiWAofCTJhmqWPW9syEQ3mdJHDZZH5eCZ-QyWL8T-FJxVvdpXxQHhTcYmGuu8lU8xjQE06RFN-\/s1600\/TrailShark%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=24479"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24479\/revisions"}],"predecessor-version":[{"id":24486,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24479\/revisions\/24486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/24487"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=24479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=24479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=24479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}