Merge pull request #3 from cmc/master

refactor, tidy up, split out config
This commit is contained in:
Chris Gates
2017-07-24 17:37:16 -04:00
committed by GitHub
18 changed files with 40 additions and 303 deletions

View File

@@ -2,22 +2,8 @@
example calling cloudwatch functions
decribe alarms, describe alarm history, list metrics
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.cloudwatch import *
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
describe_alarms(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
describe_alarm_history(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,23 +1,8 @@
'''
data pipeline example
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.datapipeline import *
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
list_pipelines(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,23 +1,8 @@
'''
dynamoDB examples
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.dynamodb import *
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
list_dynamodb_tables(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
list_dynamodb_tables_detailed(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,24 +1,7 @@
'''
This file is used to list ec2 instances
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.ec2 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
get_instance_details(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,25 +1,8 @@
'''
This file is used to list volumes of ec2 instances
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.ec2 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
get_instance_volume_details(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
get_instance_volume_details2(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -2,23 +2,7 @@
'''
This file is used to list EBS volumes and whether or not they are encrypted. This is only for "in-use" (running) volumes.
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.ec2 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
review_encrypted_volumes(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,25 +1,8 @@
'''
This file is used to perform some ElasticBeanstalk actions
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.elasticbeanstalk import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
#describe_applications(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
#describe_application_versions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,25 +1,8 @@
'''
This file is used to perform some EMR actions
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.emr import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
list_clusters(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,27 +1,9 @@
'''
if you have root or IAM access gather user info, manipulate access keys or passwords, make backdoor account
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.iam import *
from libs.sts import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY =''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
get_accountid(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
check_root_account(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,24 +1,8 @@
'''
This file is used to list lambda functions and event mappings
'''
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.aws_lambda import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
list_functions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
list_event_source_mappings(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,18 +1,4 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.opsworks import *
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
describe_stacks(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,20 +1,4 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
from libs.rds import *
pp = pprint.PrettyPrinter(indent=5, width=80)
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY =''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
describe_db_instances(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,20 +1,6 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.brute import *
from libs.s3 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
check_root_account(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
brute_acm_permissions(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,21 +1,10 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
import sys
from libs.s3 import *
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY = ''
if len(sys.argv) < 2:
print "must specify bucket: {} <bucketname>".format(sys.argv[0])
sys.exit(-1)
#Attempt to list the contents of the bucket
get_s3bucket_policy(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY,'myfuckingbucket')
get_s3bucket_policy(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, sys.argv[1])

View File

@@ -1,22 +1,8 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.s3 import *
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY =''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
#open a list of possible buckets and attempt to list the contents
f = open('test.txt', 'r')
with open('bucket_list.txt', 'r') as f:
for line in f:
line = line.strip()
if not line:

View File

@@ -1,20 +1,4 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.s3 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
#AWS_ACCESS_KEY_ID = ''
#AWS_SECRET_ACCESS_KEY =''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
get_s3objects_for_account_detailed(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)

View File

@@ -1,20 +1,4 @@
import boto3
import botocore
import json
import urllib
import logging
import sys,os
import pprint
pp = pprint.PrettyPrinter(indent=5, width=80)
from libs.s3 import *
#insert AWS key, will figure out how to pull this in from a single file for all scripts
AWS_ACCESS_KEY_ID = ''
AWS_SECRET_ACCESS_KEY =''
from config import AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
get_s3objects_for_account(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)