Group-IB / cloud_sherlock
☆33Updated last year
Alternatives and similar repositories for cloud_sherlock:
Users that are interested in cloud_sherlock are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- ☆17Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Red Team Server (RTS)☆16Updated last year
- New Framework Red Team Operations☆17Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆27Updated last year
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆32Updated last week
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated 3 weeks ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆45Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Internal Network Penetration Test Playbook☆19Updated 3 years ago