Neuvik / BucketHoarderLinks
☆55Updated last year
Alternatives and similar repositories for BucketHoarder
Users that are interested in BucketHoarder are comparing it to the libraries listed below
Sorting:
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- ☆139Updated last year
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Everything and anything related to password spraying☆138Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆196Updated 6 months ago
- ☆74Updated 10 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 2 weeks ago
- LDAP Enumeration Tool for Pentesters☆47Updated last month
- ☆35Updated 3 years ago
- ☆55Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆61Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆147Updated 5 months ago
- ☆68Updated last year
- a map for the azure oriented pentests☆66Updated last year
- ☆53Updated 4 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- ☆70Updated last month
- ☆68Updated this week
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- Cloud subdomains identification tool☆58Updated last month
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆39Updated 4 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year