yahoo / SubdomainSleuthLinks
Scanner to identify dangling DNS records and subdomain takeovers
☆49Updated 11 months ago
Alternatives and similar repositories for SubdomainSleuth
Users that are interested in SubdomainSleuth are comparing it to the libraries listed below
Sorting:
- ☆114Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Protect against subdomain takeover☆94Updated 3 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated 11 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- ☆60Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆24Updated 2 weeks ago
- Tools to assess DNS security.☆152Updated last year
- boostsecurityio/lotp☆136Updated this week
- Scan your account for the use of untrusted AMIs☆29Updated 2 months ago
- GCP cloud security CTF☆47Updated 4 months ago
- ☆10Updated 3 years ago
- ☆50Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆44Updated last week
- Holds the public Hacking the Cloud CTFs.☆59Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 8 months ago
- ☆39Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 11 months ago
- Identify IP addresses owned by public cloud providers☆126Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 5 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- ☆55Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated last year
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆107Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago