Neuvik / BucketHoarderLinks
☆54Updated last year
Alternatives and similar repositories for BucketHoarder
Users that are interested in BucketHoarder are comparing it to the libraries listed below
Sorting:
- Azure Service Subdomain Enumeration☆67Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Everything and anything related to password spraying☆150Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆204Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆148Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 3 months ago
- ☆144Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆53Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- Azure mindmap for penetration tests☆190Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated 2 weeks ago
- ☆91Updated 2 years ago
- ☆173Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 9 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Cloud subdomains identification tool☆61Updated 6 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 6 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆117Updated 2 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- A Red Team Activity Hub☆224Updated last week
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆97Updated 2 months ago