FestIn - Open S3 Bucket Scanner
β230Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for festin
Users that are interested in festin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple python script to check against hypothetical JWT vulnerability.β51Nov 29, 2020Updated 5 years ago
- Find cloud assets that no one wants exposed π βοΈβ348Jul 20, 2020Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β78Mar 4, 2022Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.β103Jul 26, 2020Updated 5 years ago
- Suite of programs meant to aid in bug hunting and security assessmentsβ77Dec 29, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Search exposed EBS volumes for secretsβ302Apr 24, 2023Updated 2 years ago
- Searching for virtual hosts among non-resolvable domainsβ88Apr 29, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β762Sep 23, 2024Updated last year
- Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.β134Jul 11, 2021Updated 4 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...β279Feb 11, 2021Updated 5 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.β93Jul 9, 2025Updated 8 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β646Nov 21, 2019Updated 6 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated filesβ¦β684Jul 15, 2024Updated last year
- take a list of resolved subdomains and output any corresponding CNAMES en masse.β18Jan 29, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Awesome cloud enumeratorβ1,108Mar 9, 2025Updated last year
- automated web assets enumeration & scanning [DEPRECATED]β288Mar 7, 2023Updated 3 years ago
- WRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.β19Nov 30, 2022Updated 3 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.β213Jun 23, 2020Updated 5 years ago
- Take a list of domains/subdomains and probe for working http/https server.β192Sep 8, 2020Updated 5 years ago
- The Swiss Army knife for automated Web Application Testingβ2,321May 8, 2024Updated last year
- Scan for misconfigured S3 buckets across S3-compatible APIs!β3,031Dec 11, 2025Updated 3 months ago
- Python utility to takeover domains vulnerable to AWS NS Takeoverβ86Feb 2, 2023Updated 3 years ago
- π Enumerate git repository URL from list of URL / User / Org. Friendly to pipelineβ56Nov 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Making Favicon.ico based Recon Great again !β1,269Aug 29, 2023Updated 2 years ago
- Recursive DNS Subdomain Enumerator with dead-end avoidance system (BETA)β146Apr 9, 2021Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.β534Mar 7, 2022Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilitiesβ447Sep 7, 2022Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcingβ92May 10, 2020Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.β87May 6, 2023Updated 2 years ago
- Pythonize Intruder Payloadβ13Dec 15, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Serverβ105Dec 8, 2022Updated 3 years ago
- Enumerate AWS cloud resources based on provided credentialβ52May 11, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweightβ220Apr 10, 2022Updated 3 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server forβ¦β193Sep 6, 2020Updated 5 years ago
- Tool to search secrets in various filetypes.β1,034Apr 25, 2023Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Nov 29, 2020Updated 5 years ago
- β139Mar 29, 2023Updated 3 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.β1,000Oct 4, 2022Updated 3 years ago
- Signatures for jaeles scanner by @j3ssieβ117Apr 20, 2024Updated last year