Yet another CF Enumeration tool
-
Updated
May 3, 2020 - Python
Yet another CF Enumeration tool
📦 general-purpose, "black box" CGI auditing tool (ARCHIVE)
A Simple Golang Tool That Automates OSINT For Threat Intelligence And Mapping Your Attack Surface.
VULECC is the pioneer in Next-Generation Web Application Vulnerability Scanning technology, enabling businesses to proactively probe their web assets to identify and combat the most intricate vulnerabilities.
Brute force attack script for penetration testing on gmail accounts based on python.
IP-2-CloudResource: a CLI tool for correlating a cloud IP address with its associated resources, with a focus on speed and ease-of-use.
Identify and provide details on listening services in a Windows system
Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.
Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a list of the 2022 Top 7 Cloud Attack Paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
Chiasmodon Mobile - OSINT Tool for Domain Information Gathering on Android.
Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns
Android security notes, debloat guides, scripts. Rolling.
Module for discovering the attack surface of a vulnerable program 🤺
OWASP Amass Docker Compose for setting up a full instance of the infrastructure
Site-Scanner - Web application vulnerability assessment tool.
🚀 blazing-fast pentesting suite written in Go
ssb=simple subdomain bruteforcer
Minimal web server enumeration & attack surface detection tool based on results of nmap.
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
Independent verification that the QR Codes displayed by the Cobo Vault to the Cobo App during pairing do not leak secrets.
Add a description, image, and links to the attack-surface topic page so that developers can more easily learn about it.
To associate your repository with the attack-surface topic, visit your repo's landing page and select "manage topics."