chm0dx / leakyBucketsLinks
Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneously
☆18Updated last year
Alternatives and similar repositories for leakyBuckets
Users that are interested in leakyBuckets are comparing it to the libraries listed below
Sorting:
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- URL fingerprinting made easy☆90Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Updated last year
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Central IoC scanner based on Loki☆20Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- ☆34Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- Ransomware groups posts☆44Updated this week
- Script to test NetSec capabilities.☆21Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago