0xdade / sephiroth
The Cloud Blocker
☆90Updated 2 weeks ago
Alternatives and similar repositories for sephiroth:
Users that are interested in sephiroth are comparing it to the libraries listed below
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Burp with Friends☆101Updated 2 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated last year
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- In motherland, target network calls you!☆59Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆91Updated 6 years ago
- Automatically spin up infra for phishing☆63Updated 5 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- ☆17Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- ☆52Updated 5 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- A CLI tool for querying passive DNS services☆41Updated last year