yousseflahouifi / CloudPulseLinks
AWS Cloud Landscape Search Engine
☆20Updated last year
Alternatives and similar repositories for CloudPulse
Users that are interested in CloudPulse are comparing it to the libraries listed below
Sorting:
- Tomcat backdoor based on CS blog☆27Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆12Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- This is working POC of CVE-2022-36271☆9Updated 2 years ago
- ☆25Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆17Updated last month
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- ☆28Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year