0xbharath / slurp-oldLinks
A tool to enumerate S3 buckets manually or via certstream
☆82Updated 2 years ago
Alternatives and similar repositories for slurp-old
Users that are interested in slurp-old are comparing it to the libraries listed below
Sorting:
- A simple file-based scanner to look for potential AWS access and secret keys in files☆92Updated last year
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- S3 bucket enumerator☆44Updated 7 years ago
- Amazon bucket brute force tool☆102Updated 11 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- AWS S3 Bucket/Object Finder☆120Updated 3 years ago
- ☆126Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆39Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- A place to store my own wordlists, and link to others that are useful☆108Updated last year