An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet π
β12Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for endgame
Users that are interested in endgame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β12Jan 4, 2022Updated 4 years ago
- β19Oct 4, 2021Updated 4 years ago
- #JavascriptRecon #bugbountyβ21Aug 18, 2021Updated 4 years ago
- Automated blind-xss search for Burp Suiteβ22Mar 28, 2022Updated 4 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).β25May 30, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu insteadβ¦β10Dec 16, 2024Updated last year
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injectionβ13Jul 24, 2022Updated 3 years ago
- Deployment code for ashirt-serverβ20Oct 15, 2025Updated 5 months ago
- β15Jan 26, 2023Updated 3 years ago
- check if the source code compressed and uploaded to the server by mistakeβ10Feb 21, 2022Updated 4 years ago
- β13Jul 13, 2023Updated 2 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.β12Feb 15, 2022Updated 4 years ago
- H&E- Burp Highlighter and Extractorβ18Mar 29, 2023Updated 2 years ago
- Fast Subdomain Enumeration Tool made with Bash only π―β15Nov 3, 2021Updated 4 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- β103Aug 4, 2025Updated 7 months ago
- Exploit for CVE-2024-4883β11Jul 8, 2024Updated last year
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as feβ¦β10May 9, 2025Updated 10 months ago
- Automatically perform advanced NTLM hash relay attacksβ15Nov 4, 2022Updated 3 years ago
- Some of the gf patterns which i useβ44Jan 19, 2022Updated 4 years ago
- RDP Checkerβ64Feb 23, 2024Updated 2 years ago
- Two applications for the M5Stack ATOM Echo running MicroPython.β14Jun 2, 2020Updated 5 years ago
- β12Feb 23, 2015Updated 11 years ago
- LinkedIn reconnaissance toolβ11Dec 29, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- β29Feb 16, 2022Updated 4 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agentsβ18Oct 16, 2024Updated last year
- RepoToStoreBugBountyInfoβ11Mar 11, 2020Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β11Jun 14, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.β11Dec 6, 2023Updated 2 years ago
- Easily connect to a VPN in a country of your choiceβ14Jan 22, 2017Updated 9 years ago
- Convert an IP into Alternative / Obfuscated versions of itselfβ14Aug 13, 2022Updated 3 years ago
- Semgrep rules to identify GWT attack surfaceβ12Apr 28, 2022Updated 3 years ago
- Checks for signature requirements over LDAPβ98Oct 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- LLM Supported Attack Scenario Creator from Code Reviewβ14Oct 22, 2024Updated last year
- β17Oct 21, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)β18May 15, 2022Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)β13Aug 8, 2023Updated 2 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dorkβ16Jul 17, 2022Updated 3 years ago
- Dradis API Python Wrapperβ13Mar 19, 2024Updated 2 years ago
- Compiled Binaries for Sharp Suiteβ15Dec 28, 2019Updated 6 years ago