halencarjunior / sss3
Simple S3 Bucket Testing Software
☆31Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for sss3
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Validate proxies for specific domain☆34Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆12Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- Burp extension for quickly copying request/response data.☆26Updated last month
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆10Updated 5 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 3 years ago
- Kubernetes Scanner☆41Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆56Updated 2 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆20Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Maintaining account persistence via XSS and Oauth☆76Updated 5 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 4 years ago