olizimmermann / s3dnsLinks
Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern
☆97Updated 3 weeks ago
Alternatives and similar repositories for s3dns
Users that are interested in s3dns are comparing it to the libraries listed below
Sorting:
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 5 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆51Updated 4 months ago
- ☆190Updated 5 months ago
- AI/LLM local model integration for analysis of reconftw results☆83Updated 5 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆56Updated 2 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆178Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆139Updated 6 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated last month
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- A real fake social engineering app☆128Updated 2 months ago
- A collection of config files for linux focusing on hackthebox theme☆53Updated 9 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated 2 weeks ago
- ☆94Updated 6 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- ☆106Updated last week
- Nuclei templates for honeypots detection.☆196Updated last year
- Analyze Android native `.so` files☆81Updated 2 months ago
- ☆125Updated 3 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated last week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- ☆65Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆77Updated 6 months ago
- A blind SQL injection brute forcer☆111Updated 5 months ago
- Discovering Typo Squatting on your domains!☆73Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆41Updated 3 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year