☆34May 18, 2023Updated 2 years ago
Alternatives and similar repositories for cloud_sherlock
Users that are interested in cloud_sherlock are comparing it to the libraries listed below
Sorting:
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆23Mar 13, 2025Updated 11 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- ☆39Nov 24, 2022Updated 3 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Official Website Of The Sigma Project☆21Feb 16, 2026Updated last week
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, e…☆49Dec 8, 2022Updated 3 years ago
- A tool for extracting additional data from a person's personal identifiers☆43Nov 14, 2023Updated 2 years ago
- OSINT tool for search by nickname☆37Apr 27, 2021Updated 4 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Dec 3, 2021Updated 4 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆24Dec 17, 2021Updated 4 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- Fortinet FortiClient EMS SQL Injection☆52Mar 20, 2024Updated last year
- ☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissan…☆114Feb 16, 2026Updated last week
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- ☆32Mar 26, 2024Updated last year
- Este repositório tem como objetivo centralizar as informações que foram compartilhadas nos vídeos do Youtube referente aos primeiros pass…☆40Jul 15, 2024Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆69Sep 25, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 9 months ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Sep 16, 2019Updated 6 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago