​
# Azure IP Rangeshttps://azurerange.azurewebsites.net/​# AWS IP Rangehttps://ip-ranges.amazonaws.com/ip-ranges.json- Get creation datejq .createDate < ip-ranges.json- Get info for specific regionjq '.prefixes[] | select(.region=="us-east-1")' < ip-ranges.json- Get all IPsjq -r '.prefixes | .[].ip_prefix' < ip-ranges.json​# Online serviceshttps://viewdns.info/https://securitytrails.com/https://www.shodan.io/search?query=net%3A%2234.227.211.0%2F24%22https://censys.io/ipv4?q=s3​# Google Dorkssite:*.amazonaws.com -www "compute"site:*.amazonaws.com -www "compute" "ap-south-1"site:pastebin.com "rds.amazonaws.com" "u " pass OR passwordhttps://storage.googleapis.com/COMPANY​# Check certificate transparency logshttps://crt.sh%.netfilx.com​# Find Cloud Servicespython3 cloud_enum.py -k keyworkpython3 CloudScraper.py -u https://example.com​# AWS Buckets# Dorksite:*.s3.amazonaws.com ext:xls | ext:xlsx | ext:csv password|passwd|pass user|username|uid|email​# AWS discovering, stealing keys and endpoints# Nimbostratus - check against acutal profilehttps://github.com/andresriancho/nimbostratuspython nimbostratus dump-credentials​# ScoutSuite - audit AWS, GCP and Azure cloudsscout --provider aws --profile stolen​# Prowler - AWS security assessment, auditing and hardeninghttps://github.com/toniblyx/prowler