yehgdotnet / S3ScannerLinks
Scan for open S3 buckets and dump
☆37Updated 7 years ago
Alternatives and similar repositories for S3Scanner
Users that are interested in S3Scanner are comparing it to the libraries listed below
Sorting:
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- ☆29Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Listing subdomains about a main domain☆59Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- ☆11Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Updated 4 years ago
- ☆46Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ☆47Updated 9 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago