pownjs / git
Assorted tools for security-related task for git repositories
☆59Updated 2 years ago
Alternatives and similar repositories for git:
Users that are interested in git are comparing it to the libraries listed below
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆59Updated 5 years ago
- ☆22Updated 2 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- ☆44Updated 4 years ago
- ☆124Updated 7 months ago
- Push notifications for passive DNS data☆107Updated 8 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- ☆70Updated 3 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- ☆90Updated 3 years ago
- Find orphaned IP's on cloud services☆29Updated 5 years ago
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- Burp with Friends☆101Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆55Updated 3 years ago
- Basic implementation of certstream to print new subdomains and domains☆37Updated 3 years ago
- jenkinz is a tool to retrieve every build for every job ever created and run on a given Jenkins instance.☆66Updated 5 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- ☆70Updated 3 years ago
- ☆10Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆63Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago