diff --git a/README.md b/README.md index 7194151..44d2580 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# awacs-scanner V2.0.3 +# awacs-scanner V2.2.7 ## What's awacs-scanner? @@ -15,6 +15,7 @@ BTW. awacs-scanner has nothing to do with the actual plane, it is just named tha * Python module so you can make a tool yourself with the awacs_core * vulners api to search for exploits * searchsploit to search for exploits +* S3 Bucket discovery ## Installation 1. Go to the releases tab @@ -36,12 +37,15 @@ BTW. awacs-scanner has nothing to do with the actual plane, it is just named tha stealth_flight, vuln_scan, battering_ram (Read more about scans from github) -c CONFIGURATION, --configuration CONFIGURATION Configuration file for awacs scanner (Syntax in github). + --company COMPANY Name of the company being scanned. This will be used for s3 bucket scanning ("NULL" if it's not a company) + ``` ## Example usage ``` awacs -t target.txt --st stealth_flight awacs -t example.com -f "-p 21" awacs -t example1.example.com,example2.example.com --st battering_ram -c config.conf +awacs -t randomcompany.corp --st battering_ram --company randomcompany ``` @@ -51,6 +55,7 @@ Showing an example of awacs-scanner’s potential by scanning a russian ftp serv * stealth_flight * Syn nmap scan * Sesitive file discovery by osint + * S3 Bucket discovery * vuln_scan (default if none provided) * Nmap scan with version detection * Use searchsploit to search for exploits @@ -59,6 +64,7 @@ Showing an example of awacs-scanner’s potential by scanning a russian ftp serv * Full aggressive nmap * Full genocide_engine treatment * Same as vuln_scan without the nmap one + * S3 Bucket discovery ## Building from source ```