pbnj / YAS3BLLinks
🔓 Yet Another S3 Bucket Leak
☆29Updated 6 years ago
Alternatives and similar repositories for YAS3BL
Users that are interested in YAS3BL are comparing it to the libraries listed below
Sorting:
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- ☆25Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Summation of the OWASP Testing Guide for reference☆10Updated 7 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Updated 10 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- ☆13Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆10Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago