☆127Jul 10, 2024Updated last year
Alternatives and similar repositories for scour
Users that are interested in scour are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Sep 10, 2021Updated 4 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Fetch the details of assets hosted on AWS.☆88Dec 4, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- macOS Initial Access Payload Generator☆323Jan 10, 2024Updated 2 years ago
- S3 Account Search☆39Jul 25, 2025Updated 7 months ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- ☆142May 4, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- efsu is for accessing AWS EFS from your machine without a VPN☆42Jun 25, 2021Updated 4 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- MacOS C2 Framework☆85Sep 2, 2021Updated 4 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆98Sep 14, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Utilities to extract secrets from 1Password☆109Aug 17, 2021Updated 4 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- ☆576Jul 12, 2025Updated 8 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago