chm0dx / leakyBuckets
Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, and Microsoft Azure simultaneously
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for leakyBuckets
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆27Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- A collection of cyberchef recipes for use in osint investigations☆13Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆26Updated 3 months ago
- ☆22Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- ☆12Updated 3 weeks ago
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆28Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 9 months ago
- ☆29Updated last year
- ☆15Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆56Updated 3 years ago
- Sniffing out well-known threat groups☆28Updated 3 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Ransomware groups posts☆35Updated this week
- ☆11Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago