Anvil Secure's Burp extension for signing AWS requests with SigV4
☆21Aug 20, 2025Updated 6 months ago
Alternatives and similar repositories for aws-sigv4
Users that are interested in aws-sigv4 are comparing it to the libraries listed below
Sorting:
- ☆25Mar 21, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated 2 weeks ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆19Apr 19, 2024Updated last year
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆104Mar 17, 2023Updated 2 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- ☆31Mar 11, 2021Updated 4 years ago
- JWT Attack to change the algorithm RS256 to HS256☆34May 8, 2023Updated 2 years ago
- Django Web UI contributed by Yandex for w3af.☆51Mar 17, 2015Updated 10 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- ☆28Sep 25, 2020Updated 5 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- alert-manager provides CRD implementation for wavefront alerts, splunk alerts etc.,☆12Nov 20, 2025Updated 3 months ago
- Library to parse Splunk-specific .conf files.☆12Updated this week
- A gentle introduction to binary exploitation☆41May 9, 2020Updated 5 years ago
- Fix missing Linux firmware kernel modules!☆17Jan 1, 2024Updated 2 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Oct 31, 2023Updated 2 years ago