Neuvik / BucketHoarderLinks
☆55Updated last year
Alternatives and similar repositories for BucketHoarder
Users that are interested in BucketHoarder are comparing it to the libraries listed below
Sorting:
- Azure Service Subdomain Enumeration☆62Updated 10 months ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Everything and anything related to password spraying☆142Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- ☆140Updated last year
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆197Updated 8 months ago
- Cloud subdomains identification tool☆60Updated 2 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 2 months ago
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆41Updated this week
- ☆170Updated 3 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆92Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 7 months ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆37Updated this week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- A Red Team Activity Hub☆212Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 3 months ago