0xdade / sephirothLinks
The Cloud Blocker
☆108Updated 10 months ago
Alternatives and similar repositories for sephiroth
Users that are interested in sephiroth are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Burp with Friends☆103Updated 2 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- ☆108Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 3 years ago
- SNIcat☆128Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Updated 4 years ago
- MimeCast Password Spraying Tool☆47Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Red team oriented key finder and correlator☆21Updated last month
- Electron based screenshot scanner☆68Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- ☆121Updated last week
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆47Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago