Enumeration

Explore 38 curated cybersecurity tools, with 14,275 visitors searching for solutions

Guide to Ethical Hacking Logo

A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

5
censys-enumeration Logo

A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.

0
2tearsinabucket Logo

A tool for enumerating and analyzing Amazon S3 buckets associated with specific targets to identify potential security misconfigurations.

0
cariddi Logo

An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.

0
CloudScraper Logo

CloudScraper is an enumeration tool that discovers cloud storage resources including S3 buckets, Azure blobs, and DigitalOcean Spaces across target environments.

0
s3reverse Logo

A format conversion tool for S3 buckets designed to assist bug bounty hunters and security testers in standardizing bucket data during reconnaissance activities.

0
S3BucketList Logo

A Chrome extension that automatically detects and lists Amazon S3 buckets while browsing websites.

0
parameth Logo

A brute force parameter discovery tool for identifying hidden GET and POST parameters in web applications during security assessments.

0
AWSBucketDump Logo

A security tool for discovering and analyzing interesting files in AWS S3 buckets across multiple regions and bucket types.

0
ESC Logo

ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.

0
Yar Logo

Yar is a reconnaissance tool for scanning organizations, users, and repositories to identify vulnerabilities and security risks during security assessments.

0
Tugarecon Logo

A subdomain enumeration tool for penetration testers and security researchers.

0
ScanCannon Logo

A Python-based tool for external attack surface discovery and reconnaissance across large-scale networks, focusing on IP address and subdomain enumeration.

0
LFI-Enum Logo

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

0
Enumerate IAM Permissions Logo

A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.

0
assetfinder Logo

A command-line tool for discovering domains and subdomains related to a target domain during reconnaissance activities.

0
Cloud_enum Logo

Cloud_enum is a multi-cloud OSINT tool that enumerates publicly accessible resources across AWS, Azure, and Google Cloud platforms for security assessment purposes.

0
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0
AWS List Resources Logo

A Python tool that uses AWS Cloud Control API to enumerate and catalog AWS resources across specified accounts and regions, outputting results in JSON format.

0
CloudFox Logo

CloudFox is an open source command line tool that helps penetration testers and offensive security professionals identify exploitable attack paths and gain situational awareness in cloud infrastructure environments.

0
GCPBucketBrute Logo

A script to enumerate Google Storage buckets and determine access and privilege escalation

0
go-pillage-registries Logo

A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.

0
AWS Resource Discovery Logo

A command-line tool that discovers and catalogs all AWS resources across an account using botocore, outputting results in JSON format.

0
Scilla Logo

An information gathering tool for DNS, subdomains, ports, and directories enumeration.

0