tacticaljmp / danglingaws
Tool to tackle problematic dangling domains in Amazon Web Services.
☆14Updated 7 years ago
Alternatives and similar repositories for danglingaws:
Users that are interested in danglingaws are comparing it to the libraries listed below
- ☆14Updated last year
- Hostile Dropboxes Management☆26Updated 5 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Kibana app for RedELK☆16Updated last year
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆15Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- ☆14Updated last month
- Zone transfers for rwhois☆20Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago