☆569Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for s3crets_scanner
Users that are interested in s3crets_scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructure☆705Oct 17, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Text4Shell scanner for Burp Suite☆189Oct 27, 2022Updated 3 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,067Feb 3, 2026Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆987Jan 12, 2024Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Jan 22, 2025Updated last year
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,202Oct 6, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,585Mar 4, 2024Updated 2 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,843Feb 25, 2026Updated last month
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,993May 20, 2025Updated 10 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,157Mar 8, 2026Updated 2 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Discover new target domains using Content Security Policy☆508Mar 16, 2026Updated last week
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,228Aug 18, 2023Updated 2 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Jan 9, 2023Updated 3 years ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆238Jan 10, 2024Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,366Aug 6, 2025Updated 7 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,042Jul 12, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 2 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆677Oct 23, 2025Updated 5 months ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.☆1,419Jan 19, 2025Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,297Aug 7, 2025Updated 7 months ago