random-robbie / slurp
Enumerate S3 buckets via certstream, domain, or keywords
☆13Updated 6 years ago
Alternatives and similar repositories for slurp:
Users that are interested in slurp are comparing it to the libraries listed below
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- ☆0Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- A collection of scripts used to interact with the Burp Rest API☆51Updated 5 years ago
- ☆37Updated 4 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 5 months ago
- A collection of published exploits and proof-of-concept code.☆20Updated 7 years ago
- ☆29Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- ☆23Updated 4 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 4 years ago
- .NET Deserialization Passive Scanner☆45Updated 6 years ago