owasp-amass / amass-docker-composeLinks
OWASP Amass Docker Compose for setting up a full instance of the infrastructure
☆49Updated 2 months ago
Alternatives and similar repositories for amass-docker-compose
Users that are interested in amass-docker-compose are comparing it to the libraries listed below
Sorting:
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- Dredging up secrets from the depths of the file system☆131Updated 10 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago
- ☆21Updated 2 years ago
- MayorSec DNS Enumeration Tool☆88Updated 9 months ago
- ☆38Updated last month
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 9 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- AWS, Azure, Alibaba and Google bucket scanner☆157Updated 2 years ago
- ☆78Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 5 months ago
- ☆34Updated 2 years ago
- ☆83Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆12Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆128Updated 7 months ago
- ☆22Updated 3 months ago
- ☆55Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆56Updated 7 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- ☆61Updated 3 months ago
- ☆35Updated 5 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 4 months ago