SpectralOps / netz
Discover internet-wide misconfigurations while drinking coffee
β388Updated 3 years ago
Alternatives and similar repositories for netz:
Users that are interested in netz are comparing it to the libraries listed below
- preflight helps you verify scripts and executables to mitigate chain of supply attacks such as the recent Codecov hack.β153Updated 2 years ago
- Find cloud assets that no one wants exposed π βοΈβ335Updated 4 years ago
- A tool to hunt for credentials in github wild AKA git*huntβ293Updated 2 years ago
- A catalog of SaaS APIs and their security levels, compliance, and regulation like GDPR, ISO27001, PCI and othersβ125Updated 3 years ago
- Yar is a tool for plunderin' organizations, users and/or repositories.β235Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Muβ¦β219Updated 4 years ago
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.β386Updated last year
- FestIn - Open S3 Bucket Scannerβ231Updated 4 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.β902Updated this week
- Awesome cloud enumeratorβ950Updated 6 months ago
- A tool for IDN homograph attacks and detection.β731Updated 4 years ago
- DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplieβ¦β278Updated 4 years ago
- Private key usage verificationβ423Updated 2 months ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.β684Updated last year
- An Office365 User Attack Toolβ628Updated 10 months ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerβ¦β155Updated last year
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.β720Updated 2 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Pythonβ198Updated 3 years ago
- A fast and secure multi protocol honeypot.β313Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.β498Updated last year
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered foβ¦β195Updated 2 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but stillβ¦β410Updated last week
- Overlord - Red Teaming Infrastructure Automationβ613Updated 8 months ago
- automated web assets enumeration & scanning [DEPRECATED]β287Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ209Updated 4 years ago
- Uncover forgotten secrets and bring them back to life, haunting security and operations teams.β207Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.β346Updated last year
- Flamingo captures credentials sprayed across the network by various IT and security products.β452Updated last month
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover supportβ293Updated 2 months ago
- Golang reverse/bind shell generatorβ228Updated 3 years ago