1N3 / CloudHunterLinks
Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them
☆36Updated 7 years ago
Alternatives and similar repositories for CloudHunter
Users that are interested in CloudHunter are comparing it to the libraries listed below
Sorting:
- PHP tool to test XSS☆22Updated 6 years ago
- ☆21Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 2 weeks ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Credentials Checking Framework☆53Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Updated 6 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- Kubernetes Scanner☆40Updated 3 years ago
- yet another dirbuster☆18Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 5 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Updated 6 years ago
- Burp Intruder File Payload Generator☆18Updated 6 years ago
- ☆38Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 7 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆55Updated 2 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago