Dumps Salesforce objects if provided with credentials.
☆28Jul 31, 2025Updated 9 months ago
Alternatives and similar repositories for aura-dump
Users that are interested in aura-dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slide deck and demo code for my DEFCON 26 talk☆11Aug 17, 2018Updated 7 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆20Mar 12, 2025Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Lazily wraps various Linux system auditing tools☆20Mar 20, 2026Updated last month
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Python implementation of the CaRT library for (un)inerting files.☆53Feb 10, 2025Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆27Mar 18, 2026Updated last month
- Network scanner☆46Apr 2, 2026Updated last month
- A library and tool for discovering and mapping Controlling TTYs in Linux.☆24Jul 10, 2024Updated last year
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 11 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆44Aug 5, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆69May 1, 2025Updated last year
- NVD API 2.0 client for CVE information☆14May 15, 2025Updated 11 months ago
- ☆24Mar 12, 2025Updated last year
- Run the Medusa Android framework inside a docker container on x86 or ARM