A tool for identifying misconfigured CloudFront domains
☆362Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for cloudfrunt
Users that are interested in cloudfrunt are comparing it to the libraries listed below
Sorting:
- Route53/CloudFront Vulnerability Assessment Utility☆86Sep 11, 2023Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Mar 18, 2024Updated last year
- WeirdAAL (AWS Attack Library)☆835Jan 13, 2025Updated last year
- Security Tool to Look For Interesting Files in S3 Buckets☆1,454Apr 10, 2024Updated last year
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Nov 9, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆532Mar 7, 2022Updated 3 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- Tool to search secrets in various filetypes.☆1,034Apr 25, 2023Updated 2 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,997Dec 11, 2025Updated 2 months ago
- A Powerful Subdomain Takeover Tool☆963Oct 17, 2023Updated 2 years ago
- Enumerate the permissions associated with AWS credential set☆1,219Feb 5, 2024Updated 2 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Updated this week
- Security auditing tool for AWS environments☆1,725Nov 28, 2018Updated 7 years ago
- Exploits written by the Rhino Security Labs team☆1,095Jan 23, 2021Updated 5 years ago
- ☆128Sep 2, 2019Updated 6 years ago
- Drupal enumeration & exploitation tool☆612Nov 4, 2020Updated 5 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,167Dec 8, 2022Updated 3 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Subdomain Takeover tool written in Go☆2,028Aug 13, 2023Updated 2 years ago
- A simple CORS misconfiguration scanner☆422Aug 14, 2020Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆867Apr 27, 2021Updated 4 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Nov 14, 2019Updated 6 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆629Feb 5, 2019Updated 7 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,801Feb 28, 2025Updated last year
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,142Jun 25, 2019Updated 6 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆558Mar 6, 2023Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A tool to find sensitive keys and passwords in Travis logs☆139Jun 27, 2021Updated 4 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year