Macmod / goblobLinks
A fast enumeration tool for publicly exposed Azure Storage blobs.
☆99Updated 2 years ago
Alternatives and similar repositories for goblob
Users that are interested in goblob are comparing it to the libraries listed below
Sorting:
- ☆78Updated last year
- ☆55Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆141Updated last year
- Azure Service Subdomain Enumeration☆65Updated 11 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆109Updated last week
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆48Updated 4 months ago
- ☆56Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 8 months ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 4 months ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- ☆68Updated 2 years ago
- ☆92Updated 2 years ago
- Cloud subdomains identification tool☆60Updated 4 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆68Updated last year
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆108Updated 3 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆41Updated 4 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆45Updated last week
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago