Enumerate AWS S3 buckets using different permutations
☆17Jan 28, 2022Updated 4 years ago
Alternatives and similar repositories for PyLazyS3
Users that are interested in PyLazyS3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated last month
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- Amazon S3 bucket spelunking!☆87Aug 23, 2017Updated 8 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- A collection of automation scripts for bug bounty hunting.☆32Feb 4, 2023Updated 3 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 9 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- CTF writeups☆16Nov 20, 2025Updated 4 months ago
- Code snippets and demo example for other projects☆14Apr 23, 2021Updated 4 years ago
- The Ethereum Improvement Proposal repository☆14Apr 16, 2019Updated 6 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Slides and material from my conference presentations☆16Mar 30, 2024Updated last year
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- A vulnerabilities database for fully-automated audits☆16Jul 20, 2023Updated 2 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 2 weeks ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago