cr0hn / festinLinks
FestIn - Open S3 Bucket Scanner
☆234Updated 4 years ago
Alternatives and similar repositories for festin
Users that are interested in festin are comparing it to the libraries listed below
Sorting:
- Find cloud assets that no one wants exposed 🔎 ☁️☆345Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆173Updated 3 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆249Updated 3 weeks ago
- ☆249Updated 11 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- S3 Account Search☆6Updated 7 months ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆144Updated 2 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆198Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆197Updated this week
- Uncover forgotten secrets and bring them back to life, haunting security and operations teams.☆207Updated 2 years ago
- Search exposed EBS volumes for secrets☆298Updated 2 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆203Updated last year
- AWS S3 Bucket/Object Finder☆120Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Damn Vulnerable Cloud Application☆192Updated 6 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆124Updated last year
- A tool for identifying misconfigured CloudFront domains☆357Updated 4 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- vulnerable single sign on☆147Updated 10 months ago
- Pentesting/Bugbounty Dockerfiles.☆176Updated 4 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆59Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆225Updated 3 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆212Updated 4 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆220Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆158Updated last year
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆211Updated 5 years ago