knqyf263 / crtsh
API client for crt.sh
☆41Updated 4 years ago
Alternatives and similar repositories for crtsh:
Users that are interested in crtsh are comparing it to the libraries listed below
- The Cloud Blocker☆92Updated 3 weeks ago
- An Evil OIDC Server☆53Updated 2 years ago
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- Burp with Friends☆102Updated 2 years ago
- Burp Extension for AWS Signing☆87Updated 2 months ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆61Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- S3 bucket enumerator☆44Updated 7 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆78Updated last year
- The original slurp source☆33Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- a shared short domain for XSS and other hacks☆31Updated 3 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash / Shitrix☆35Updated 5 years ago
- Scan DockerHub images that match a keyword to find secrets.☆55Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- ☆28Updated 4 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- DNS File EXfiltration☆46Updated 11 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- A natural evolution of Burp Suite's Repeater tool☆92Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago