Finds internet-exposed resources in an AWS account
☆18Sep 1, 2024Updated last year
Alternatives and similar repositories for awscanner
Users that are interested in awscanner are comparing it to the libraries listed below
Sorting:
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- OWASp PureCaptcha project☆25Dec 15, 2019Updated 6 years ago
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- MWDB exercises☆20Jan 21, 2025Updated last year
- 😎 A curated list of the best resources in the HASH ecosystem☆30Sep 14, 2023Updated 2 years ago
- ☆35Mar 8, 2022Updated 4 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 6 years ago
- 👀☆17May 16, 2023Updated 2 years ago
- [Fugitive was made to offer resourcfulness to 'Osint Investigations' Fugitive will allow you to collect detailed information about "subje…☆36Jun 9, 2023Updated 2 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- A Torrent Magnet Link Scrapper☆18Jul 31, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Adobe XD plugin for automatic time tracking and metrics generated from your XD usage.☆11Oct 24, 2023Updated 2 years ago
- A simple scavenger hunt to learn about pentesting a website or web application.☆16Feb 12, 2026Updated last month
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A game of Space Invaders using Kaboom.js☆13May 11, 2021Updated 4 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- ☆14Sep 25, 2025Updated 5 months ago
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- ☆10Mar 4, 2018Updated 8 years ago
- Zelda using Kaboom.js☆11May 16, 2021Updated 4 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Some bouncing particles☆24Jun 17, 2014Updated 11 years ago
- ☆22Feb 29, 2024Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- Fractals using Python 3☆10Apr 9, 2021Updated 4 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Jul 20, 2017Updated 8 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- A very simple wrapper for Cloudflare D1 Databases' REST API in using Python for Python xD☆13Jun 14, 2024Updated last year
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago