tacticaljmp / danglingawsLinks
Tool to tackle problematic dangling domains in Amazon Web Services.
☆14Updated 8 years ago
Alternatives and similar repositories for danglingaws
Users that are interested in danglingaws are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Updated 6 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Visualize your Terraform files☆34Updated 5 years ago
- Collection of Semgrep rules for security analysis☆11Updated last year
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- ☆25Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- A static website template for security pages.☆52Updated 4 months ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Updated 8 years ago