pbnj / YAS3BLLinks
🔓 Yet Another S3 Bucket Leak
☆29Updated 7 years ago
Alternatives and similar repositories for YAS3BL
Users that are interested in YAS3BL are comparing it to the libraries listed below
Sorting:
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A framework for automating penetration testing using a plugin based architecture☆41Updated 3 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆25Updated 4 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 8 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Conference talk slides and code☆11Updated 5 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- extracts urls from text☆16Updated 7 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- ☆38Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 6 years ago
- Burp as a Docker Container☆59Updated 5 years ago