AWSGen.py – Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names
AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source
AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source
Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It...
A ssh-client worm made with tas framework.How it works?This is a fakessh-client that manipulates the tty input/output to execute arbitrary...
Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess...
Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential.Operational Usage...
Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface.InstallingDownload the latest release for your...
Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy...
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes...
Rapid7 chief data scientist Bob Rudis, threat intelligence team member Charlie Stafford, and VRM engineering manager Brent Cook also contributed...
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...
In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...
FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal...
This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live...
Let's start off talking about CVE-2020-0688 from last month -- the Microsoft Exchange Validation Key RCE vulnerability. At the time...
In a recent episode of Rapid7’s podcast, Security Nation, we talked with Nick Percoco, the creator of Chicago-based security conference...
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear...
About Proton FrameworkProton Framework is a Windows post exploitation framework similar to other penetration testing tools such as Meterpreter and...
This is the final post in our four-part series on security in the cloud. In part one, we discussed the...
Note that the tool is still under development. Things may break anytime - hence, beta!A fast and flexible NTLM reconnaissance...
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides...
Today there are many ways to create a reverse shell in order to be able to remotely control a machine...
Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for...