ropnop / serverless_toolkitLinks
A collection of useful Serverless functions I use when pentesting
☆389Updated 2 years ago
Alternatives and similar repositories for serverless_toolkit
Users that are interested in serverless_toolkit are comparing it to the libraries listed below
Sorting:
- DNS Rebinding Exploitation Framework☆492Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 6 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- a CLI for ephemeral penetration testing☆15Updated 5 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 7 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆290Updated 7 months ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Updated 4 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆252Updated 3 years ago
- ☆217Updated 3 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Updated 5 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- Red Team Tactics, Techniques, and Procedures☆410Updated last month
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 6 years ago
- All my infosec notes I have been building up over the years☆336Updated 6 months ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated 2 years ago
- secretz, minimizing the large attack surface of Travis CI☆328Updated 3 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆562Updated 2 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆223Updated 2 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- Web app authorisation coverage scanning☆236Updated 2 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆258Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆400Updated 3 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 4 years ago