0xdade / sephirothLinks
The Cloud Blocker
☆108Updated 11 months ago
Alternatives and similar repositories for sephiroth
Users that are interested in sephiroth are comparing it to the libraries listed below
Sorting:
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- Burp with Friends☆103Updated 3 years ago
- ☆108Updated 4 years ago
- ☄️ go-out - A Golang egress buster.☆126Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 4 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- ☆121Updated 3 weeks ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- SNIcat☆128Updated 4 years ago
- MimeCast Password Spraying Tool☆47Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Red team oriented key finder and correlator☆21Updated 2 months ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- ☆57Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Electron based screenshot scanner☆68Updated 3 years ago