diff --git a/modules/ec2__download_userdata/main.py b/modules/ec2__download_userdata/main.py index c55e52f3..e7b859a1 100644 --- a/modules/ec2__download_userdata/main.py +++ b/modules/ec2__download_userdata/main.py @@ -130,7 +130,7 @@ def main(args, pacu_main): print(' {}@{}: User Data found'.format(instance_id, region)) - #check for secerts + #check for secrets find_secrets(formatted_user_data) # Write to the "all" file diff --git a/modules/iam__bruteforce_permissions/main.py b/modules/iam__bruteforce_permissions/main.py index c1d73a02..7a6329fd 100644 --- a/modules/iam__bruteforce_permissions/main.py +++ b/modules/iam__bruteforce_permissions/main.py @@ -137,8 +137,8 @@ def generate_preload_actions(): def read_only_function(service, func): - """Verifies that actions being ran are ReadOnlyAccess to minimize unexpecteed - changes to the AWS enviornment. + """Verifies that actions being ran are ReadOnlyAccess to minimize unexpected + changes to the AWS environment. """ module_dir = os.path.dirname(__file__) path = os.path.join(module_dir, 'ReadOnlyAccessPolicy.json') diff --git a/modules/inspector__get_reports/main.py b/modules/inspector__get_reports/main.py index 48e7b6ae..32f086d7 100644 --- a/modules/inspector__get_reports/main.py +++ b/modules/inspector__get_reports/main.py @@ -9,7 +9,7 @@ 'name': 'inspector__get_reports', 'author': 'Alexander Morgenstern', 'category': 'ENUM', - 'one_liner': 'Captures vulnerabilties found when running a preconfigured inspector report.', + 'one_liner': 'Captures vulnerabilities found when running a preconfigured inspector report.', 'description': "This module captures findings for reports in regions that support AWS Inspector. The optional argument --download-reports will automatically download any reports found into the session downloads directory under a folder named after the run id of the inspector report.", 'services': ['Inspector'], 'prerequisite_modules': [], diff --git a/modules/lambda__enum/main.py b/modules/lambda__enum/main.py index 685deac5..37f78117 100644 --- a/modules/lambda__enum/main.py +++ b/modules/lambda__enum/main.py @@ -41,7 +41,7 @@ parser = argparse.ArgumentParser(add_help=False, description=module_info['description']) parser.add_argument('--versions-all', required=False, default=False, action='store_true', help='Grab all versions instead of just the latest') parser.add_argument('--regions', required=False, default=None, help='One or more (comma separated) AWS regions in the format us-east-1. Defaults to all session regions.') -parser.add_argument('--checksource', required=False, default=False, action='store_true', help='Download and scan all lambda functions for secrets. Warning this could effect perforamce.' ) +parser.add_argument('--checksource', required=False, default=False, action='store_true', help='Download and scan all lambda functions for secrets. Warning this could effect performance.' ) SOURCE_ENTROPY_THRESHOLD = 3.8 diff --git a/modules/s3__download_bucket/main.py b/modules/s3__download_bucket/main.py index b78bae2b..738c927d 100644 --- a/modules/s3__download_bucket/main.py +++ b/modules/s3__download_bucket/main.py @@ -163,7 +163,7 @@ def main(args, pacu_main): buckets.append(bucket['Name']) print(' Found bucket "{bucket_name}"'.format(bucket_name=bucket['Name'])) - # Process Enuemrated Buckets + # Process Enumerated Buckets print('Starting enumerating objects in buckets...') summary_data['readable_buckets'] = 0 objects = {} diff --git a/modules/systemsmanager__rce_ec2/main.py b/modules/systemsmanager__rce_ec2/main.py index def0913f..823dfdf2 100644 --- a/modules/systemsmanager__rce_ec2/main.py +++ b/modules/systemsmanager__rce_ec2/main.py @@ -154,7 +154,7 @@ def main(args, pacu_main): for role in roles: # For each AssumeRole statement for statement in role['AssumeRolePolicyDocument']['Statement']: - # Statement->Principal could be a liist or a dict + # Statement->Principal could be a list or a dict if type(statement['Principal']) is list: # For each item in the list, check if ec2.amazonaws.com is in it for principal in statement['Principal']: