yousseflahouifi / CloudPulse
AWS Cloud Landscape Search Engine
☆20Updated last year
Alternatives and similar repositories for CloudPulse
Users that are interested in CloudPulse are comparing it to the libraries listed below
Sorting:
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- ☆25Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆30Updated 3 weeks ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- ☆28Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆19Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- ☆12Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 10 months ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Updated last year
- Simple recon tool automates your recon process☆17Updated 2 years ago