Neuvik / BucketHoarder
☆55Updated last year
Alternatives and similar repositories for BucketHoarder:
Users that are interested in BucketHoarder are comparing it to the libraries listed below
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- Everything and anything related to password spraying☆133Updated 11 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆139Updated 11 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆193Updated 5 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 3 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆55Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 4 months ago
- ☆53Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Cloud subdomains identification tool☆54Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆107Updated 2 weeks ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆68Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated 10 months ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆34Updated 2 weeks ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- A public, open source physical security methodology☆45Updated last year
- ☆20Updated 11 months ago
- Custom queries list for BloodHound☆24Updated 7 months ago
- ☆35Updated 3 years ago