iSECPartners / scoutLinks
AWS EC2 and S3 Security Auditing Tool
☆41Updated 11 years ago
Alternatives and similar repositories for scout
Users that are interested in scout are comparing it to the libraries listed below
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 8 months ago
- Vulnerable Grails application☆43Updated 10 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Websocket based egress tester☆20Updated 9 years ago
- A Python library for being a CND Batman....☆35Updated 10 years ago
- ☆27Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Updated 9 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Public version of PDF X-RAY☆59Updated 13 years ago
- Docker Automated Build for Security Testing Tools☆14Updated 3 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- ☆50Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 4 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago