tacticaljmp / danglingawsLinks
Tool to tackle problematic dangling domains in Amazon Web Services.
☆14Updated 8 years ago
Alternatives and similar repositories for danglingaws
Users that are interested in danglingaws are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Updated 6 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- HoneyDB Python Module☆14Updated last year
- Visualize your Terraform files☆34Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆60Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 9 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- ☆15Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago