Enumerate AWS S3 buckets using different permutations
☆17Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for PyLazyS3
Users that are interested in PyLazyS3 are comparing it to the libraries listed below
Sorting:
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- A collection of automation scripts for bug bounty hunting.☆32Feb 4, 2023Updated 3 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 8 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Aug 12, 2025Updated 6 months ago
- Python library for the simulation of probabilistic circuits.☆11Feb 1, 2026Updated last month
- Framework for studying cryptographic hash functions using SAT.☆10Dec 21, 2021Updated 4 years ago
- Automated Continuous Data Quality Measurement☆12Nov 15, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- Simple python script that converts all Excel files (xls, xlsx, xlsm, csv) in a directory into xlsb files.☆10Mar 13, 2023Updated 2 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Oct 28, 2025Updated 4 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- ☆37Nov 9, 2025Updated 3 months ago
- CSC 424 Advanced Database Management Systems☆16Jan 1, 2020Updated 6 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- Robert C. Martin's Agile Software Development, Principles, Patterns, and Practices codes in Java☆10Dec 12, 2017Updated 8 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Some Monte Carlo algorithms for the estimation of small probabilities associated with rare events☆11Aug 16, 2023Updated 2 years ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 2 years ago
- ☆11Nov 18, 2025Updated 3 months ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- ☆11Sep 29, 2019Updated 6 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- KCP bindings for Rust☆10Feb 1, 2022Updated 4 years ago