yousseflahouifi / CloudPulseLinks
AWS Cloud Landscape Search Engine
☆20Updated last year
Alternatives and similar repositories for CloudPulse
Users that are interested in CloudPulse are comparing it to the libraries listed below
Sorting:
- Quicky serve files over http or https using flask.☆35Updated 8 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 9 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆20Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated 5 months ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Updated 7 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- ☆25Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Manage attack surface data on Elasticsearch☆23Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago