Scan for open S3 buckets and dump
☆10Mar 8, 2018Updated 8 years ago
Alternatives and similar repositories for S3Scanner
Users that are interested in S3Scanner are comparing it to the libraries listed below
Sorting:
- Fum is a command-line tool for fuzzy matching, recursively searching files for a literal pattern☆10Oct 7, 2019Updated 6 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- Multithreaded interactive Mandelbrot and Julia viewer built via a library on OpenGL☆11Apr 30, 2019Updated 6 years ago
- The internet is covered in 💩. Avoid it.☆12Aug 28, 2017Updated 8 years ago
- Extract messages from a local Microsoft Teams installation☆16Jan 14, 2023Updated 3 years ago
- Nextcloud with NixOS in the backend and P2P connectivity enabled☆26Mar 10, 2026Updated last week
- ☆16Oct 26, 2024Updated last year
- ☆15Mar 12, 2025Updated last year
- signal-cli (formerly textsecure-cli) provides a commandline and dbus interface for WhisperSystems/libsignal-service-java☆15Jul 16, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆11May 24, 2017Updated 8 years ago
- ☆10May 25, 2023Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This r…☆62Feb 17, 2018Updated 8 years ago
- ☆11May 9, 2019Updated 6 years ago
- Configuration files in Unix-like systems to automate all configurations and preferences from my build, to get a system running the way I …☆11Jan 9, 2026Updated 2 months ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- RNA-seq Viewer Team at the NCBI-assisted Boston Genomics Hackathon☆37Jul 24, 2017Updated 8 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Raspberry Pi Specific flakes for NixOS☆20Jan 26, 2024Updated 2 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Human activity recognition using human pose information to aid classification.☆13Oct 1, 2017Updated 8 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 9 years ago
- A website for finding where people are logged in at 42 USA.☆10Jul 3, 2017Updated 8 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- NanoRT(SW ray tracer) backend for NanoVG☆54Mar 19, 2022Updated 4 years ago
- Noisebridge's donation infrastructure☆16Feb 28, 2020Updated 6 years ago