BBVA / patton-cliLinks
The knife of the Admin & Security auditor
☆42Updated 5 years ago
Alternatives and similar repositories for patton-cli
Users that are interested in patton-cli are comparing it to the libraries listed below
Sorting:
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Puny Domain Name Check☆38Updated 6 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- ☆90Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- ☆12Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 7 years ago
- ☆32Updated 10 years ago
- ☆61Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago