diff --git a/.github/workflows/security-zizmor.yml b/.github/workflows/security-zizmor.yml index 977e459..12a5703 100644 --- a/.github/workflows/security-zizmor.yml +++ b/.github/workflows/security-zizmor.yml @@ -21,7 +21,7 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@v6.0.0 + uses: actions/checkout@v6.0.1 with: persist-credentials: false diff --git a/.github/workflows/stargazers.yml b/.github/workflows/stargazers.yml index 65fea2e..7c37b20 100644 --- a/.github/workflows/stargazers.yml +++ b/.github/workflows/stargazers.yml @@ -15,7 +15,7 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@v6.0.0 + uses: actions/checkout@v6.0.1 with: fetch-depth: 0 persist-credentials: false diff --git a/README.md b/README.md index 1fb2e7b..ba308c3 100644 --- a/README.md +++ b/README.md @@ -450,6 +450,7 @@ - [CloudBrute](https://github.com/0xsha/CloudBrute) - Awesome cloud enumerator - [s3cario](https://github.com/0xspade/s3cario) - This tool will get the CNAME first if it's a valid Amazon s3 bucket and if it's not, it will try to check if the domain is a bucket name. - [S3Cruze](https://github.com/JR0ch17/S3Cruze) - All-in-one AWS S3 bucket tool for pentesters. +- [s3dns](https://github.com/olizimmermann/s3dns) - Passive DNS-based discovery of S3 (and other cloud) buckets by resolving CNAMEs and IPs during recon—ideal for stealthy and early identification of cloud storage exposures ### CMS diff --git a/requirements.txt b/requirements.txt index 5c2c849..7984430 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1 +1 @@ -zizmor==1.16.3 +zizmor==1.19.0