avineshwar / slurpView external linksLinks
S3 bucket enumerator
☆44Dec 3, 2017Updated 8 years ago
Alternatives and similar repositories for slurp
Users that are interested in slurp are comparing it to the libraries listed below
Sorting:
- The original slurp source☆33Nov 25, 2018Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 weeks ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ☆13Feb 18, 2022Updated 3 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Feb 27, 2018Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- ☆13Oct 19, 2022Updated 3 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- ☆33Aug 14, 2020Updated 5 years ago
- Modular rootkit framework.☆30Mar 26, 2021Updated 4 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- ☆13May 31, 2023Updated 2 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Jun 11, 2021Updated 4 years ago
- Pypykatz server☆125Mar 15, 2019Updated 6 years ago
- JSON API's Are Automatically Protected Against CSRF, And Google Almost Took It Away.☆34Jul 9, 2017Updated 8 years ago
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Capture The Flag Marker System☆17Oct 21, 2018Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago