jregele / grawler
Extract deleted secrets from git repos
☆60Updated 7 years ago
Alternatives and similar repositories for grawler:
Users that are interested in grawler are comparing it to the libraries listed below
- A collection of useful scripts for penetration testers☆81Updated 12 years ago
- ☆55Updated 4 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- Test a network's egress controls with various levels of success and failure.☆103Updated 2 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆81Updated 4 years ago
- Common Findings Database☆100Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Amazon S3 bucket spelunking!☆84Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆103Updated 2 years ago
- Scripts for Deploying new server☆48Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆110Updated 5 years ago
- penetration testing scripts☆137Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- OAuth Security Cheatsheet☆39Updated 10 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- ☆61Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated last month
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 9 years ago