{"id":31332,"date":"2023-11-22T11:02:21","date_gmt":"2023-11-22T11:02:21","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31332"},"modified":"2023-11-22T11:02:22","modified_gmt":"2023-11-22T11:02:22","slug":"goblob","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/goblob\/","title":{"rendered":"Goblob: Azure Blob Storage Enumeration Tool"},"content":{"rendered":"\n<p>Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs, which can be useful for various research purposes such as vulnerability assessments, penetration testing, and reconnaissance.<\/p>\n\n\n\n<p><em>Warning<\/em>. Goblob will issue individual goroutines for each container name to check in each storage account, only limited by the maximum number of concurrent goroutines specified in the&nbsp;<code>-goroutines<\/code>&nbsp;flag. This implementation can exhaust bandwidth pretty quickly in most cases with the default wordlist, or potentially cost you a lot of money if you&#8217;re using the tool in a cloud environment. Make sure you understand what you are doing before running the tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/Macmod\/goblob#installation\"><\/a><strong>Installation<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>go install github.com\/Macmod\/goblob@latest<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><\/h2>\n\n\n\n<p>To use goblob simply run the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ .\/goblob &lt;storageaccountname&gt;<\/code><\/pre>\n\n\n\n<p>Where&nbsp;<code>&lt;storageaccountname&gt;<\/code>&nbsp;is the target storage account to enumerate public Azure blob storage URLs on.<\/p>\n\n\n\n<p>You can also specify a list of storage account names to check:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ .\/goblob -accounts accounts.txt<\/code><\/pre>\n\n\n\n<p>By default, the tool will use a list of common Azure Blob Storage container names to construct potential URLs. However, you can also specify a custom list of container names using the&nbsp;<code>-containers<\/code>&nbsp;option. For example:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ .\/goblob -accounts accounts.txt -containers wordlists\/goblob-folder-names.txt<\/code><\/pre>\n\n\n\n<p>The tool also supports outputting the results to a file using the&nbsp;<code>-output<\/code>&nbsp;option:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ .\/goblob -accounts accounts.txt -containers wordlists\/goblob-folder-names.txt -output results.txt<\/code><\/pre>\n\n\n\n<p>If you want to provide accounts to test via&nbsp;<code>stdin<\/code>&nbsp;you can also omit&nbsp;<code>-accounts<\/code>&nbsp;(or the account name) entirely:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cat accounts.txt | .\/goblob<\/code><\/pre>\n\n\n\n<p>Wordlists<\/p>\n\n\n\n<p>Goblob comes bundled with basic wordlists that can be used with the&nbsp;<code>-containers<\/code>&nbsp;option:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/Macmod\/goblob\/blob\/main\/wordlists\/goblob-folder-names.txt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wordlists\/goblob-folder-names.txt<\/a>\u00a0(default) &#8211; Adaptation from koaj&#8217;s\u00a0<a href=\"https:\/\/github.com\/koaj\/aws-s3-bucket-wordlist\/blob\/master\/list.txt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">aws-s3-bucket-wordlist<\/a>\u00a0&#8211; a wordlist containing generic bucket names that are likely to be used as container names.<\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/Macmod\/goblob\/blob\/main\/wordlists\/goblob-folder-names.small.txt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wordlists\/goblob-folder-names.small.txt<\/a>\u00a0&#8211; Subset of the default wordlist containing only words that have been found as container names in a real experiment with over 35k distinct storage accounts + words from the default wordlist that are part of the NLTK corpus.<\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/Macmod\/goblob\/blob\/main\/wordlists\/goblob-folder-names.micro.txt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wordlists\/goblob-folder-names.micro.txt<\/a>\u00a0&#8211; Subset of the small wordlist containing only words that have been found as container names in a real experiment with over 35k distinct storage accounts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/Macmod\/goblob#optional-flags\"><\/a><strong>Optional Flags<\/strong><\/h2>\n\n\n\n<p>Goblob provides several flags that can be tuned in order to improve the enumeration process:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>-goroutines=N<\/code>&nbsp;&#8211; Maximum number of concurrent goroutines to allow (default:&nbsp;<code>5000<\/code>).<\/li>\n\n\n\n<li><code>-blobs=true<\/code>&nbsp;&#8211; Report the URL of each blob instead of the URL of the containers (default:&nbsp;<code>false<\/code>).<\/li>\n\n\n\n<li><code>-verbose=N<\/code>&nbsp;&#8211; Set verbosity level (default:&nbsp;<code>1<\/code>, min:&nbsp;<code>0<\/code>, max:&nbsp;<code>3<\/code>).<\/li>\n\n\n\n<li><code>-maxpages=N<\/code>&nbsp;&#8211; Maximum of container pages to traverse looking for blobs (default:&nbsp;<code>20<\/code>, set to&nbsp;<code>-1<\/code>&nbsp;to disable limit or to&nbsp;<code>0<\/code>&nbsp;to avoid listing blobs at all and just check if the container is public)<\/li>\n\n\n\n<li><code>-timeout=N<\/code>&nbsp;&#8211; Timeout for HTTP requests (seconds, default:&nbsp;<code>90<\/code>)<\/li>\n\n\n\n<li><code>-maxidleconns=N<\/code>&nbsp;&#8211;&nbsp;<code>MaxIdleConns<\/code>&nbsp;transport parameter for HTTP client (default:&nbsp;<code>100<\/code>)<\/li>\n\n\n\n<li><code>-maxidleconnsperhost=N<\/code>&nbsp;&#8211;&nbsp;<code>MaxIdleConnsPerHost<\/code>&nbsp;transport parameter for HTTP client (default:&nbsp;<code>10<\/code>)<\/li>\n\n\n\n<li><code>-maxconnsperhost=N<\/code>&nbsp;&#8211;&nbsp;<code>MaxConnsPerHost<\/code>&nbsp;transport parameter for HTTP client (default:&nbsp;<code>0<\/code>)<\/li>\n\n\n\n<li><code>-skipssl=true<\/code>&nbsp;&#8211; Skip SSL verification (default:&nbsp;<code>false<\/code>)<\/li>\n\n\n\n<li><code>-invertsearch=true<\/code>&nbsp;&#8211; Enumerate accounts for each container instead of containers for each account (default:&nbsp;<code>false<\/code>)<\/li>\n<\/ul>\n\n\n\n<p>For instance, if you just want to find publicly exposed containers using large lists of storage accounts and container names, you should use&nbsp;<code>-maxpages=0<\/code>&nbsp;to prevent the goroutines from paginating the results. Then run it again on the set of results you found with&nbsp;<code>-blobs=true<\/code>&nbsp;and&nbsp;<code>-maxpages=-1<\/code>&nbsp;to actually get the URLs of the blobs.<\/p>\n\n\n\n<p>If, on the other hand, you want to test a small list of very popular container names against a large set of storage accounts, you might want to try&nbsp;<code>-invertsearch=true<\/code>&nbsp;with&nbsp;<code>-maxpages=0<\/code>, in order to see the public accounts for each container name instead of the container names for each storage account.<\/p>\n\n\n\n<p>You may also want to try changing\u00a0<code>-goroutines<\/code>,\u00a0<code>-timeout<\/code>\u00a0and\u00a0<code>-maxidleconns<\/code>,\u00a0<code>-maxidleconnsperhost<\/code>\u00a0and\u00a0<code>-maxconnsperhost<\/code>\u00a0and\u00a0<code>-skipssl<\/code>\u00a0in order to best use your bandwidth and find results faster.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs, which can be useful for various research purposes such as vulnerability assessments, penetration testing, and reconnaissance. Warning. Goblob will issue individual goroutines for each container name to check in each storage account, only [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6425,6321,6052,6325],"class_list":["post-31332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-goblob","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Goblob: Azure Blob Storage Enumeration Tool<\/title>\n<meta name=\"description\" content=\"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/goblob\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Goblob: Azure Blob Storage Enumeration Tool\" \/>\n<meta property=\"og:description\" content=\"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/goblob\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T11:02:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-22T11:02:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Goblob: Azure Blob Storage Enumeration Tool\",\"datePublished\":\"2023-11-22T11:02:21+00:00\",\"dateModified\":\"2023-11-22T11:02:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/\"},\"wordCount\":636,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\",\"keywords\":[\"cybersecurity\",\"Goblob\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/goblob\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/goblob\/\",\"name\":\"Goblob: Azure Blob Storage Enumeration Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\",\"datePublished\":\"2023-11-22T11:02:21+00:00\",\"dateModified\":\"2023-11-22T11:02:22+00:00\",\"description\":\"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/goblob\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Goblob: Azure Blob Storage Enumeration Tool","description":"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/goblob\/","og_locale":"en_US","og_type":"article","og_title":"Goblob: Azure Blob Storage Enumeration Tool","og_description":"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs","og_url":"https:\/\/kalilinuxtutorials.com\/goblob\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-11-22T11:02:21+00:00","article_modified_time":"2023-11-22T11:02:22+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/goblob\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/goblob\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Goblob: Azure Blob Storage Enumeration Tool","datePublished":"2023-11-22T11:02:21+00:00","dateModified":"2023-11-22T11:02:22+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/goblob\/"},"wordCount":636,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","keywords":["cybersecurity","Goblob","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/goblob\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/goblob\/","url":"https:\/\/kalilinuxtutorials.com\/goblob\/","name":"Goblob: Azure Blob Storage Enumeration Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","datePublished":"2023-11-22T11:02:21+00:00","dateModified":"2023-11-22T11:02:22+00:00","description":"Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in Azure blobs","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/goblob\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/goblob\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhyuUipmp7keBTpEIfVNhpuHPR59at-r-cGOsZpTZ1vR-1Y4JT174Mgs1r-avKOgoZrYX9VStTT8cRC0K5yLF_S-kSqXl5uX6aSr-CqFacntzS54Q9LQ98tmcDhnPbAAlLdqOTET02ZdmIu4-RpB6X2V0KYiblcifR_la9r3GB8UQohuQl8PH50qfprug\/s16000\/Goblob.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32076,"url":"https:\/\/kalilinuxtutorials.com\/azsubenum\/","url_meta":{"origin":31332,"position":0},"title":"AzSubEnum &#8211; Azure Service Subdomain Enumeration","author":"Varshini","date":"February 20, 2024","format":false,"excerpt":"AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. This tool is designed to meticulously search and identify subdomains associated with various Azure services. Through a combination of techniques and queries, AzSubEnum delves into the Azure domain structure, systematically probing and collecting subdomains related to a diverse range\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUXHm_uVIGYu8sVUF2LKj9HvO0CZNfjb9yb_cmJYl_5I63de4Zf0xxakiOyKvvVc0iD92iskI6FIevU8gNFdSK3RxyNqCaAhZ6cagfuCPwN_133_CfAgaXyAjeOPsiTT4hBXMFq5_QM19Ef6P63FleoDxY5WCoT5A5eYvulrAOgVeIOSw7iS57gopYkIP\/s16000\/Untitled%20design%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29718,"url":"https:\/\/kalilinuxtutorials.com\/vajra\/","url_meta":{"origin":31332,"position":1},"title":"Vajra &#8211; Your Weapon To Cloud","author":"Varshini","date":"August 24, 2023","format":false,"excerpt":"About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around in the Azure environment of a target. In Indian folklore, Vajra is the name of the weapon of the god of thunder and storms, Indra. Because it works with the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhMavK2m55ocs3a8TmOGIb6wexVkvD4_o0JO7vRa96xAng-XHF_IzxPJ7WT6_by8wPL3mPnrDe651PTlBKb-HVxFqDOa5p687HuBiAcOcPjQFKIxUyoFkoMuPZsuvT_Rttn4TXU1qwyF15e2-O6woE1k9OhDEtT1i8Nrt6ltkKNmZd6-t_-hMsYs8tNjw\/s16000\/68747470733a2f2f6d65646961332e67697068792e636f6d2f6d656469612f705a4f4d76555666564b4a575030354b77772f67697068792e676966.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":36658,"url":"https:\/\/kalilinuxtutorials.com\/msftrecon\/","url_meta":{"origin":31332,"position":2},"title":"MSFTRecon : A Powerful Reconnaissance Tool For Microsoft 365 And Azure","author":"Varshini","date":"February 24, 2025","format":false,"excerpt":"MSFTRecon is a specialized reconnaissance tool designed for red teamers and security professionals to map and analyze Microsoft 365 and Azure tenant infrastructures. Its primary focus is on identifying potential security misconfigurations and attack vectors without requiring authentication, making it an invaluable asset for penetration testing and security assessments. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":25482,"url":"https:\/\/kalilinuxtutorials.com\/ssoh-no\/","url_meta":{"origin":31332,"position":3},"title":"SSOh-No : User Enumeration And Password Spraying Tool For Testing Azure AD","author":"R K","date":"June 23, 2022","format":false,"excerpt":"SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD or O365. Generally, this endpoint provides extremely verbose errors which can be leveraged to enumerate users and validate their passwords via brute force\/spraying attacks, while also failing to log any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31708,"url":"https:\/\/kalilinuxtutorials.com\/cloudrecon\/","url_meta":{"origin":31332,"position":4},"title":"CloudRecon &#8211; Uncovering Hidden Cloud Assets With SSL Certificate Analysis","author":"Varshini","date":"January 17, 2024","format":false,"excerpt":"In the ever-evolving landscape of cybersecurity, red teamers and bug hunters are constantly seeking new tools to aid in their campaigns and hunts. CloudRecon, a powerful suite of tools presented at DEFCON 31 by Gunnar Andrews and Jason Haddix, is one such solution. This article explores how CloudRecon empowers security\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjGVkdveodJjb77YOCdR8C4-yF-FtTqRfKsBBdOttYdVB22HlDP8cvRFeiAFj-oU_cu5vDVzpwoIyjpFkAcSfdh1Ri803ULiybSx-W23w7gvG764xUdEWisu7iyJaW5MFIEjKbNrxmcX6JRfUOVuO9cMkSXMQSca2NB4riAjsnfDC0Jb1GP1iaXPRxF_sXq\/s16000\/Untitled%20design.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34786,"url":"https:\/\/kalilinuxtutorials.com\/shwmae\/","url_meta":{"origin":31332,"position":5},"title":"Shwmae &#8211; Exploiting Windows Hello Security Protocols","author":"Varshini","date":"September 11, 2024","format":false,"excerpt":"Shwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing Windows Hello Without a Severed Hand talk. The purpose of the tool is to abuse Windows Hello from a privileged user context. Shwmae Copyright (C) 2024 Shwmae enum (Default Verb)\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEXbEJquvW138rI3KiDHRpo8UvAi3VlFAmTHCFZIJVLB6ELcET81GydZRvasDMIJ1GYeUlfQ7I-KYJUXc-uWrCW5EPwscQtEUVMNC1v8ghCZW2xkGDJUpKbwssnbk_pcaBOF6ZMIuPNQlPoq_bOV-WenWTv6LsubJMfs52F0AjNDZ3TLYjle3gtp2EXxCr\/s16000\/Shwmae%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31332"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31332\/revisions"}],"predecessor-version":[{"id":31335,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31332\/revisions\/31335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31334"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}