pbnj / YAS3BLLinks
🔓 Yet Another S3 Bucket Leak
☆29Updated 7 years ago
Alternatives and similar repositories for YAS3BL
Users that are interested in YAS3BL are comparing it to the libraries listed below
Sorting:
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- A framework for automating penetration testing using a plugin based architecture☆41Updated 3 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Conference talk slides and code☆11Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Burp Extension for AWS Signing☆90Updated 10 months ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 6 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- ☆25Updated 4 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Updated last year
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Updated 10 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- ☆67Updated 8 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- extracts urls from text☆16Updated 7 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 7 years ago
- Burp as a Docker Container☆59Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 7 years ago
- WebApp for BugBounty Hunters☆14Updated 8 years ago