AWS,AZURE,GOOGLE CLOUD IP CIDRS
☆50Feb 14, 2022Updated 4 years ago
Alternatives and similar repositories for cloud-cidr
Users that are interested in cloud-cidr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 4 months ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Oct 28, 2025Updated 4 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- Bug Bounty Dork☆72Feb 14, 2022Updated 4 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 3 months ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- A Go implementation of dirsearch.☆43Mar 10, 2019Updated 7 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆220Apr 10, 2022Updated 3 years ago
- A tool to fetch and verify the existence of endpoints from the Wayback Machine API.☆54Jul 30, 2025Updated 7 months ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- A framework for the detection of COSI vulnerabilities / XS-Leaks☆14Mar 29, 2023Updated 2 years ago
- Open Redirect Finder.☆52Nov 8, 2025Updated 4 months ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆66May 2, 2025Updated 10 months ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago
- ☆39Sep 23, 2019Updated 6 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- ☆14Jun 26, 2025Updated 8 months ago
- ☆27Jul 30, 2021Updated 4 years ago