This repository maintains some of the scripts made by Ebryx DevSecOps team.
☆12Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for Scouter
Users that are interested in Scouter are comparing it to the libraries listed below
Sorting:
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 2 months ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆40Jun 3, 2021Updated 4 years ago
- Code snippets and demo example for other projects☆14Apr 23, 2021Updated 4 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆227Feb 10, 2022Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- An online click game written in golang that deliberately contains vulnerabilities for learning purposes.☆15Dec 29, 2025Updated 2 months ago
- A list of cyber security companies or companies that have their own Cyber Security Department.☆21Jun 10, 2024Updated last year
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- Python addon for dirsearch☆15Nov 6, 2018Updated 7 years ago
- Subgraph pH☆14Jun 16, 2022Updated 3 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Feb 22, 2019Updated 7 years ago
- Creating CS:GO server with skins, ws, gloves, knife, rank, rs, etc. both with a bash file and using a docker file.☆16Sep 11, 2022Updated 3 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- http log post-processing to add client's ASN☆12Apr 14, 2016Updated 9 years ago
- A simple SQL injection vulnerable web application powered by Docker☆24Mar 16, 2024Updated 2 years ago
- Markdown version of OWASP Testing Checklist v4☆14Aug 15, 2017Updated 8 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- ☆13Mar 2, 2018Updated 8 years ago
- repo for sharing stuff☆17Jul 1, 2025Updated 8 months ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- Administration application for the DreamFactory Platform☆13Apr 2, 2024Updated last year
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Feb 6, 2025Updated last year
- ☆12Mar 24, 2018Updated 7 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- ☆20Aug 30, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- An Android Application for making VoIP calls over FreeSWITCH server☆12Jun 4, 2015Updated 10 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- ☆31Oct 28, 2024Updated last year
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 6 months ago
- ☆31Mar 12, 2026Updated last week
- Leading User-Agent Lookup & Device, Browser and OS Detection API☆17Aug 16, 2019Updated 6 years ago
- A Python utility for flattening an entire source tree into a single markdown file☆29Dec 7, 2024Updated last year
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆31Dec 20, 2017Updated 8 years ago