olizimmermann / s3dnsLinks
Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern
☆122Updated 5 months ago
Alternatives and similar repositories for s3dns
Users that are interested in s3dns are comparing it to the libraries listed below
Sorting:
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- A collection of config files for linux focusing on hackthebox theme☆53Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- ☆195Updated 9 months ago
- AI/LLM local model integration for analysis of reconftw results☆91Updated 9 months ago
- Passive leak enumeration tool.☆266Updated this week
- SprayShark is a modular G-Suite password sprayer with threading!☆57Updated 8 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Analyze Android native `.so` files☆119Updated 6 months ago
- ☆144Updated 8 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆211Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- ☆96Updated 10 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- A real fake social engineering app☆130Updated 6 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 10 months ago
- Nuclei templates for honeypots detection.☆198Updated 2 years ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆245Updated last week
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 10 months ago
- A blind SQL injection brute forcer☆113Updated 9 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆110Updated 7 months ago
- It automates searches to detect unintentionally exposed resources such as sensitive files, admin panels, open directories and common web …☆73Updated this week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆331Updated 3 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Updated 5 months ago
- A collection of tools that I use in CTF's or for assessments☆108Updated last year
- ☆170Updated last month