S3 bucket enumerator
☆43Dec 3, 2017Updated 8 years ago
Alternatives and similar repositories for slurp
Users that are interested in slurp are comparing it to the libraries listed below
Sorting:
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆532Mar 7, 2022Updated 3 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Feb 27, 2018Updated 8 years ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆79Updated this week
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.☆12Apr 9, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- ☆33Aug 14, 2020Updated 5 years ago
- Modular rootkit framework.☆30Mar 26, 2021Updated 4 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆12May 31, 2023Updated 2 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago