guptabless / unclaim-s3-finderView external linksLinks
☆11Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for unclaim-s3-finder
Users that are interested in unclaim-s3-finder are comparing it to the libraries listed below
Sorting:
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Jun 22, 2020Updated 5 years ago
- ☆13Feb 18, 2022Updated 3 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- ☆11Aug 27, 2020Updated 5 years ago
- Hacker101 is a free class for web security. Whether you're a programmer with an interest in bug bounties or a seasoned security professio…☆11Jun 25, 2018Updated 7 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆15Feb 20, 2020Updated 5 years ago
- ☆21Mar 16, 2021Updated 4 years ago
- ☆70Jan 19, 2019Updated 7 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Jul 31, 2020Updated 5 years ago
- ☆20Aug 15, 2020Updated 5 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆98Sep 24, 2023Updated 2 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- ☆72Nov 8, 2021Updated 4 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Jul 14, 2021Updated 4 years ago
- Extract subdomains from rapiddns.io☆23Nov 24, 2022Updated 3 years ago
- Tools Auto Exploiter Plugin Revslider☆22Mar 20, 2024Updated last year
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 5 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- ☆27Jan 27, 2022Updated 4 years ago
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Sep 5, 2024Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- ☆24Aug 9, 2022Updated 3 years ago