π A concurrent, command-line AWS S3 Fuzzer. Written in Go.
β45Oct 14, 2017Updated 8 years ago
Alternatives and similar repositories for s3-fuzzer
Users that are interested in s3-fuzzer are comparing it to the libraries listed below
Sorting:
- π Yet Another S3 Bucket Leakβ29Aug 16, 2018Updated 7 years ago
- Here comes the paintrain!β11Aug 8, 2016Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with β¦β10Feb 15, 2017Updated 9 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on maβ¦β15Dec 3, 2020Updated 5 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.β11Mar 29, 2017Updated 8 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exeβ14Mar 29, 2017Updated 8 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.β15May 28, 2019Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQueryβ27Jan 16, 2018Updated 8 years ago
- Honeybadger Red Editionβ13Sep 13, 2017Updated 8 years ago
- Easy 802.1Q VLAN Hoppingβ80Jul 23, 2024Updated last year
- Catalog Red Team techniques that cause popups in various macOS versionsβ15Nov 18, 2024Updated last year
- β12Dec 16, 2016Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flashβ28Oct 17, 2016Updated 9 years ago
- List of Red Team Resourcesβ17Jun 16, 2020Updated 5 years ago
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grantβ17Mar 3, 2018Updated 8 years ago
- β13Aug 18, 2016Updated 9 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14May 20, 2021Updated 4 years ago
- Git Repo and Filesystem credential scannerβ18Sep 8, 2017Updated 8 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.β16Dec 1, 2016Updated 9 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslistsβ14Dec 27, 2017Updated 8 years ago
- Using osquery for Mass Incident Detection & Responseβ19Jun 25, 2016Updated 9 years ago
- CVE-2018-18368 SEP Manager EoP Exploitβ17Nov 27, 2019Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.β70Jul 26, 2018Updated 7 years ago
- A Github organization reconnaissance tool.β219May 22, 2023Updated 2 years ago
- Deception based detection techniques mapped to the MITREβs ATT&CK frameworkβ292Oct 28, 2017Updated 8 years ago
- Powershell MS Outlook enumeration and phishing toolβ77May 26, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privescβ73Apr 12, 2017Updated 8 years ago
- A tool for identifying misconfigured CloudFront domainsβ362Jun 24, 2020Updated 5 years ago
- Quick binary search for NTLM hash datasetβ18Jan 31, 2019Updated 7 years ago
- Powershell Empire Persistence finderβ119Jan 30, 2017Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Sharesβ170Mar 7, 2018Updated 8 years ago
- Detect x86 shellcode in files and traffic.β25Jun 12, 2018Updated 7 years ago
- β15Jul 20, 2022Updated 3 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel hostβ175May 6, 2016Updated 9 years ago
- Automatic Sender Policy Framework Reconnaissanceβ19Jul 9, 2018Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.β20Dec 1, 2016Updated 9 years ago
- β45Jul 18, 2016Updated 9 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypassesβ115May 27, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account haβ¦β501Aug 7, 2020Updated 5 years ago