Salesforce object access auditor
☆118Jan 30, 2023Updated 3 years ago
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 4 months ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Parse your Salesforce formulas and extract fields, operators and functions.☆20Mar 24, 2023Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Salesforce CLI Plug-In for the Org Documentor☆32Oct 31, 2024Updated last year
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Go scripts for checking API key / access token validity☆221Aug 3, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆203Aug 5, 2024Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆408Dec 24, 2022Updated 3 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Mar 5, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆780Aug 19, 2024Updated last year
- The official Dockerfile for Salesforce DX☆75Jan 15, 2022Updated 4 years ago
- Parse SOQL string to abstract syntax tree expression in JavaScript☆14Jan 5, 2023Updated 3 years ago
- ☆437Jun 1, 2021Updated 4 years ago
- ☆12Aug 10, 2024Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Dec 3, 2020Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 5 years ago
- Security Auditor Utility for GraphQL APIs☆628Nov 20, 2025Updated 4 months ago
- ☆13Oct 3, 2023Updated 2 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆529Apr 23, 2025Updated 11 months ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago