nagwww / 101-AWS-S3-HacksView external linksLinks
AWS S3 Hacks
☆79Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for 101-AWS-S3-Hacks
Users that are interested in 101-AWS-S3-Hacks are comparing it to the libraries listed below
Sorting:
- S3 runbook☆31Jul 27, 2017Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- AWS, Ansible, and CodeDeploy demo - Deployment Repo☆13Nov 4, 2016Updated 9 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- CVE-2018-19537☆20Nov 26, 2018Updated 7 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 5 months ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- OpenSSH 6.7p1 backdoor kit☆21Oct 23, 2014Updated 11 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Design Software Architecture Research☆13May 27, 2018Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- A DNS tunnel utilizing the Burp Collaborator☆104Oct 8, 2019Updated 6 years ago
- A syntax highlighter for Splunk SPL and other files☆27Oct 3, 2022Updated 3 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Mar 21, 2019Updated 6 years ago
- Metasploit Framework☆26Feb 10, 2026Updated last week
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- ☆10May 25, 2021Updated 4 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Repository for storing code for O'Reilly book☆34Feb 11, 2024Updated 2 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 2 weeks ago
- ☆28Oct 16, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- CSE201 Objected-Oriented Programming in C++: Teach an AI to produce pieces of music☆12Jan 23, 2019Updated 7 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- A Python Reddit scraper with dual-mode architecture: simple requests for small jobs, async + proxy rotation for large-scale scraping. Fea…☆16Oct 30, 2025Updated 3 months ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago