ustayready / fireprox
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
☆2,029Updated 2 years ago
Alternatives and similar repositories for fireprox:
Users that are interested in fireprox are comparing it to the libraries listed below
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,794Updated 6 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,743Updated this week
- Subdomain Takeover tool written in Go☆1,960Updated last year
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,325Updated 3 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆623Updated 2 years ago
- 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.☆2,706Updated 10 months ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,532Updated 5 months ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆839Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,151Updated 2 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,520Updated 2 years ago
- A Tool for Domain Flyovers☆5,751Updated 2 years ago
- Awesome cloud enumerator☆1,003Updated last month
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,400Updated 3 months ago
- ☆1,318Updated 2 weeks ago
- Convolutional neural network for analyzing pentest screenshots☆1,184Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,125Updated 2 months ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,415Updated last year
- A default credential scanner.☆1,478Updated 3 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,495Updated last year
- A DNS rebinding attack framework.☆1,082Updated last week
- Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies fo…☆1,234Updated 2 years ago
- OSINT tools and more but without API key☆1,323Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆519Updated 3 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,406Updated last year
- Making Favicon.ico based Recon Great again !☆1,183Updated last year
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,413Updated this week
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,238Updated this week
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,063Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,190Updated 5 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,431Updated 8 months ago