yousseflahouifi / CloudPulseLinks
AWS Cloud Landscape Search Engine
β20Updated 2 years ago
Alternatives and similar repositories for CloudPulse
Users that are interested in CloudPulse are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ63Updated last year
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their suβ¦β34Updated last year
- Quicky serve files over http or https using flask.β35Updated 11 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")β57Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ53Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URLβ29Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β21Updated 2 years ago
- MacroExploit use in excel sheetβ20Updated 2 years ago
- Burp extension used to snip any header from all the requests.β23Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversalβ18Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)β22Updated last year
- H&E- Burp Highlighter and Extractorβ18Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β15Updated last year
- CVE-2023-1671-POC, based on dnslog platformβ17Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scannerβ32Updated last month
- A "Spring4Shell" vulnerability scanner.β49Updated 11 months ago
- This is a working variant of the Mirai IOT botnetβ14Updated 3 years ago
- β13Updated last year
- Monitor your target continuously for new subdomains!β25Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES β¦β50Updated last year
- Automated HTTP Request Repeating With Burp Suiteβ40Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secureβ30Updated last year
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- Manage attack surface data on Elasticsearchβ23Updated 2 years ago
- β29Updated 2 years ago