sebastian-mora / AWS-LootView external linksLinks
Pull secrets from an AWS environment
☆67Feb 2, 2020Updated 6 years ago
Alternatives and similar repositories for AWS-Loot
Users that are interested in AWS-Loot are comparing it to the libraries listed below
Sorting:
- ☆46Mar 20, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Hiding implants in HTML files☆66Apr 5, 2020Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Your everyday Linux distribution gone Super Saiyan.☆62Oct 13, 2023Updated 2 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Feb 1, 2024Updated 2 years ago
- Offensive Security recon tool☆91Aug 27, 2021Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 7 months ago
- Basically a regexp over a GitHub search.☆69Mar 28, 2023Updated 2 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 2 months ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago