amroot / amass-to-csv
A simple script that generates an Excel friendly CSV file from an Amass JSON file.
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for amass-to-csv
- ☆90Updated 2 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated this week
- ☆22Updated 4 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 3 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆16Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- ☆21Updated 7 years ago
- This script is a multi-threaded Okta password sprayer.☆69Updated 10 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- Tool for making it easy to collect dns results from the CLI☆39Updated 3 months ago
- Tool for fetching all the available waybackmachine snapshot urls☆18Updated last month
- AWS Security Checks☆36Updated 6 years ago
- A collection of one off hacks and simple scripts☆27Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆45Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆36Updated 2 weeks ago
- Find the remote website version based on a git repository☆124Updated 3 years ago
- ☆37Updated 3 years ago
- Target practice for ffuf☆59Updated 3 years ago
- Additional active scan checks for BURP☆20Updated last month
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆68Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆32Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆51Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated last year
- ☆58Updated last year