JoelGMSec / CloudtopolisView external linksLinks
Zero Infrastructure Password Cracking
β413Aug 22, 2024Updated last year
Alternatives and similar repositories for Cloudtopolis
Users that are interested in Cloudtopolis are comparing it to the libraries listed below
Sorting:
- The Shadow Attack Frameworkβ1,116Sep 4, 2022Updated 3 years ago
- π§ Abuse of Google Colab for cracking hashes.β967Jul 17, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints πβ504Sep 23, 2025Updated 4 months ago
- β44Aug 3, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,438Dec 18, 2022Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β781Jun 20, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Teamβ¦β819Oct 27, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automationβ628May 28, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,254Mar 19, 2025Updated 10 months ago
- Phishing Framework for Pentestersβ201May 16, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.jsβ256Apr 6, 2024Updated last year
- Emulate and Dissect MSF and *other* attacksβ143Feb 28, 2024Updated last year
- Fully modular persistence frameworkβ258Apr 10, 2023Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.β107Jul 10, 2022Updated 3 years ago
- Cloud Security Operations Orchestratorβ188Apr 17, 2024Updated last year
- β1,665Apr 14, 2025Updated 10 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs β¦β75Oct 30, 2023Updated 2 years ago
- β69Oct 6, 2021Updated 4 years ago
- Ask a TGS on behalf of another user without passwordβ481Mar 30, 2025Updated 10 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.β448Aug 18, 2023Updated 2 years ago
- Extract credentials from lsass remotelyβ2,176Dec 24, 2025Updated last month
- Dumping DPAPI credz remotelyβ1,318Mar 24, 2025Updated 10 months ago
- a tool to help operate in EDRs' blind spotsβ767Dec 2, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 2 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposesβ2,515Feb 5, 2026Updated last week
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Awareβ604Aug 27, 2024Updated last year
- Automation for internal Windows Penetrationtest / AD-Securityβ3,639Aug 28, 2025Updated 5 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Jun 19, 2024Updated last year
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelistingβ823Nov 15, 2025Updated 3 months ago
- Maximizing BloodHound. Max is a good boy.β531Apr 25, 2025Updated 9 months ago
- β539Nov 20, 2021Updated 4 years ago
- NTLM relaying for Windows made easyβ579Apr 25, 2023Updated 2 years ago
- Enumerate Domain Dataβ335Sep 13, 2023Updated 2 years ago
- Hide your payload in DNSβ617May 3, 2023Updated 2 years ago
- Retrieve LAPS password from LDAPβ433Feb 17, 2021Updated 4 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sysβ¦β492Jul 23, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,169Sep 29, 2021Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injectionβ422May 21, 2022Updated 3 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objectsβ1,685Jan 8, 2024Updated 2 years ago