DigiNinja's bucket_finder utility
☆17Aug 30, 2016Updated 9 years ago
Alternatives and similar repositories for bucket_finder
Users that are interested in bucket_finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of Marp-based presentation templates for 3-SHAKE. Features standardized designs, citation styles, and custom layouts for cloud…☆15Mar 4, 2026Updated 3 weeks ago
- Go HackerOne API Client☆11May 16, 2024Updated last year
- Simple and clear sample code for Remote Attestation☆11Aug 10, 2024Updated last year
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 3 months ago
- A curated list of awesome appsec tools available on Ubuntu 🗄️☆12Mar 4, 2024Updated 2 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆12Jun 20, 2022Updated 3 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- Parseltongue is a powerful prompt hacking tool/browser extension for real-time tokenization visualization and seamless text conversion, s…☆15Jan 11, 2025Updated last year
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆293May 2, 2024Updated last year
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated 2 months ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆64Mar 13, 2026Updated 2 weeks ago
- A python script to bypass 403-forbidden.☆13Aug 2, 2021Updated 4 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- AI agent set for cloud security purple teaming, runs inside Claude Code, Gemini CLI, and Codex.☆43Mar 21, 2026Updated last week
- Advanced AWS Access Credentials Scanner ⚡☆13Apr 26, 2023Updated 2 years ago
- Project to generate Fake Reviews using Tensorflow's word RNN model with text smoothing technique☆10Jun 6, 2018Updated 7 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- dotfiles☆11Mar 10, 2026Updated 2 weeks ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆66Mar 20, 2026Updated last week
- Awesome GPT-4 with Applications. This is a collection of resources related to GPT-4, including news, official documents, demo and applica…☆20Mar 15, 2023Updated 3 years ago
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year