https://github.com/awstoolbox/find-public-rds-snapshots

A tool for finding all public RDS snapshots, filterable using regex.

https://github.com/awstoolbox/find-public-rds-snapshots

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (12.9%) to scientific vocabulary

Keywords

aws offensive-security security security-audit security-tools wolfsoftware
Last synced: 5 months ago · JSON representation

Repository

A tool for finding all public RDS snapshots, filterable using regex.

Basic Info
  • Host: GitHub
  • Owner: AWSToolbox
  • License: mit
  • Language: Python
  • Default Branch: master
  • Homepage:
  • Size: 31.3 KB
Statistics
  • Stars: 2
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 2
Topics
aws offensive-security security security-audit security-tools wolfsoftware
Created over 3 years ago · Last pushed over 1 year ago
Metadata Files
Readme Contributing Funding License Code of conduct Codeowners Security

README.md

AWSToolbox logo
Github Build Status Release Commits since release

Overview

This tool will allow you to search for ALL public RDS snapshots based on a given regular expression (regex). The default regular expression is .* which means match everything.

Like most tools that could be exploited for nefarious means, we did think long and hard about wether we should release this tool or not, but we decided that most of the bad actors already have tools like this and this tool could be used by the good guys to protect themselves.

Example Usage

The following example will search for all public RDS snapshots which contain the word wolf software.

shell ./find-public-rds-snapshots.py -s 'wolf.+software'

The search text is matched against the DBSnapshotIdentifier and the DBInstanceIdentifier. Please refer to the AWS documentation for more details.

Usage

```shell usage: find-public-rds-snapshots [-h] [-v] [-r REGIONS] [-s SEARCH] [-i] [-t] [-c] [-j] [-f FILENAME] [-S SORT_ORDER]

Locate any public rds snapshots

flags: -h, --help show this help message and exit -v, --verbose Account level output (default: False)

required arguments: -r REGIONS, --regions REGIONS A comma separated list of regions to search (default: all) -s SEARCH, --search SEARCH The search regex (default: .*)

optional arguments: -i, --case-insensitive Make the search case insensitive (default: False) -t, --terminal Draw a table of the results on the terminal (default: False) -c, --csv Save the results as a csv formatted file (default: False) -j, --json Save the results as a json formatted file (default: False) -f FILENAME, --filename FILENAME The filename to save the results to (default: search-results)

sorting arguments: -S SORTORDER, --sort-order SORTORDER Define the sort order of the results (E, R, S, T) (default: None)

Search Options: E=Database Engine, R=Region Name, S=Database Size, T=Creation Time. Prefixing any of the above with an exclamation sign (!) will invert the order. ```

Known Limitations

The script can only locate public RDS snapshots within regions to which your account credentials have access, so if a region is NOT enabled in your account then you will not see public RDS snapshots from that region.

If you want to see which regions you have access to, then we provide a tool for that also. AWS List Regions

Owner

  • Name: AWS Toolbox
  • Login: AWSToolbox
  • Kind: organization
  • Email: github@wolfsoftware.com
  • Location: United Kingdom

A selection of tools for Amazon Web Services. Created by Wolf Software.

GitHub Events

Total
  • Watch event: 1
Last Year
  • Watch event: 1

Dependencies

.github/workflows/cicd-pipeline.yml actions
  • Gamesight/slack-workflow-status v1.1.0 composite
  • actions/checkout v3 composite
  • actions/setup-go v3 composite
  • actions/setup-python v4 composite
  • ruby/setup-ruby v1 composite
.github/workflows/codeql-analysis.yml actions
  • actions/checkout v3 composite
  • github/codeql-action/analyze v2 composite
  • github/codeql-action/autobuild v2 composite
  • github/codeql-action/init v2 composite
.github/workflows/delete-old-runs.yml actions
  • Mattraks/delete-workflow-runs v2 composite
.github/workflows/dependabot-approve-and-auto-merge.yml actions
  • dependabot/fetch-metadata v1.3.3 composite
.github/workflows/generate-release.yml actions
  • Bullrich/generate-release-changelog master composite
  • actions/checkout v3 composite
  • softprops/action-gh-release v1 composite
.github/workflows/git-guardian.yml actions
  • GitGuardian/ggshield-action master composite
  • actions/checkout v3 composite
.github/workflows/greetings.yml actions
  • actions/first-interaction v1 composite
.github/workflows/handle-stale.yml actions
  • actions/stale v6 composite
.github/workflows/purge-obsolete-runs.yml actions
  • otto-contentfactory/purge-workflow-runs v1 composite
Scripts/requirements.txt pypi
  • boto3 ==1.24.84
  • botocore ==1.27.84
  • colored ==1.4.3
  • prettytable ==3.4.1
  • yaspin ==2.2.0