s3-leaks
List of AWS S3 Leaks
Feel free to send in a PR if you know of other leaks
Elastic Search
| Date | Description | Notes |
|---|---|---|
| Sep 2017 | AWS hosted elastic search servers hijacked |
Feel free to send in a PR if you know of other leaks
| Date | Description | Notes |
|---|---|---|
| Sep 2017 | AWS hosted elastic search servers hijacked |
Log4j_checker.py (CVE-2021-44228) Description This Python3 script tries to look for servers vulnerable to CVE-2021-44228, also known as Log4Shell, a v
Example on how to query events by a RESTful API, compose CEF event format and send the events to an UDP receiver.
evil-stalker How to run First of all, you must install the necessary libraries.
ezNTFS ezNTFS is an easy-to-use wrapper for NTFS-3G on macOS. ezNTFS can be used as a menu bar app, or via the CLI in the terminal. Installation To us
Cisco RV110W UPnP 0day 分析 前言 最近UPnP比较火,恰好手里有一台Cisco RV110W,在2021年8月份思科官方公布了一个Cisco RV系列关于UPnP的0day,但是具体的细节并没有公布出来。于是想要用手中的设备调试挖掘一下这个漏洞,漏洞的公告可以在官网看到。 准
This is A Python & Bash Programming Based Termux-Tool Created By CRACKER911181. This Tool Created For Hacking and Pentesting. If You Use This Tool To Evil Purpose,The Owner Will Never be Responsible
A script based on sqlmap that uses sql injection vulnerabilities to traverse the existence o
Discord-keylogger Usage python dlogger.py -t [Time interval in sec] if not speci
Vuln Impact An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files tha
Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 1.installation pip3 install -r requirements.txt 2.Usage $ python3 spring-cloud-gateway
Phishing-Crack Phishing Tool Version 1.0.0 Created By temirovazat A Phishing Tool With PHP and Python3 Features Fake Instagram Phishing Page Fake Face
shell-reverse Uma ferramenta de segurança da informação escrita em python3, capaz de dar acesso total ao computador de alguém! A cybersecurity tool wr
privacyIDEA privacyIDEA is an open solution for strong two-factor authentication like OTP tokens, SMS, smartphones or SSH keys. Using privacyIDEA you
AmiEviL - This program uses the Virus Total API to determine if your suspicious file is malicious or not. The program requests the hash of the file and outputs information (if any). This version will
GitLab-Wiki-RCE RCE Exploit for Gitlab 13.9.4 RCE via unsafe inline Kramdown options when rendering certain Wiki pages Allows any user with push acc
Backdoor This is a Backdoor, created with Python 3. Types of Commands: Downloading / Uploading files. Launching / Deleting / Reading file's content. S
Password-Generator-using-Python A simple password generator that generates password for you. User can Copy the password to Clipboard. Project made usi
SSH server & client auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
A tool for removing malicious content from input data before saving data into database. It takes input containing HTML with XSS scripts and returns va
Hashpic Hashpic creates an image from the MD5 hash of your input. Since v0.2.0 i