VirtueSecurity / aws-extender-cliLinks
AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues using the boto/boto3 SDK library.
☆83Updated 5 years ago
Alternatives and similar repositories for aws-extender-cli
Users that are interested in aws-extender-cli are comparing it to the libraries listed below
Sorting:
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Scripts for Deploying new server☆48Updated 3 months ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆154Updated 10 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago