AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues using the boto/boto3 SDK library.
☆83Apr 22, 2020Updated 5 years ago
Alternatives and similar repositories for aws-extender-cli
Users that are interested in aws-extender-cli are comparing it to the libraries listed below
Sorting:
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- ☆29Jan 10, 2023Updated 3 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,458Apr 10, 2024Updated last year
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 7 years ago
- A lab to play with authentication and authorisation problems☆99Mar 7, 2023Updated 3 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Nodejs application intentionally vulnerable to SSRF☆42May 12, 2023Updated 2 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- something i needed once☆20Mar 12, 2011Updated 15 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Exploits written by the Rhino Security Labs team☆1,096Jan 23, 2021Updated 5 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- WebLogic Exploit☆143Jul 13, 2018Updated 7 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆201Aug 11, 2017Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago