Zero Infrastructure Password Cracking
β416Aug 22, 2024Updated last year
Alternatives and similar repositories for Cloudtopolis
Users that are interested in Cloudtopolis are comparing it to the libraries listed below
Sorting:
- The Shadow Attack Frameworkβ1,115Sep 4, 2022Updated 3 years ago
- π§ Abuse of Google Colab for cracking hashes.β967Jul 17, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints πβ504Sep 23, 2025Updated 5 months ago
- β44Aug 3, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,442Dec 18, 2022Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β782Jun 20, 2020Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automationβ628May 28, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,263Mar 19, 2025Updated 11 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Teamβ¦β819Oct 27, 2023Updated 2 years ago
- Phishing Framework for Pentestersβ201May 16, 2023Updated 2 years ago
- High speed/Low cost CommonCrawl RegExp in Node.jsβ256Apr 6, 2024Updated last year
- Emulate and Dissect MSF and *other* attacksβ143Feb 28, 2024Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.β106Jul 10, 2022Updated 3 years ago
- Fully modular persistence frameworkβ259Apr 10, 2023Updated 2 years ago
- Cloud Security Operations Orchestratorβ188Apr 17, 2024Updated last year
- β1,670Apr 14, 2025Updated 10 months ago
- Extract credentials from lsass remotelyβ2,180Dec 24, 2025Updated 2 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs β¦β75Oct 30, 2023Updated 2 years ago
- β69Oct 6, 2021Updated 4 years ago
- Ask a TGS on behalf of another user without passwordβ482Mar 30, 2025Updated 11 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.β445Aug 18, 2023Updated 2 years ago
- Dumping DPAPI credz remotelyβ1,329Mar 24, 2025Updated 11 months ago
- a tool to help operate in EDRs' blind spotsβ766Dec 2, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Awareβ602Aug 27, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposesβ2,530Feb 5, 2026Updated last month
- Automation for internal Windows Penetrationtest / AD-Securityβ3,644Aug 28, 2025Updated 6 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Jun 19, 2024Updated last year
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelistingβ825Nov 15, 2025Updated 3 months ago
- Maximizing BloodHound. Max is a good boy.β532Apr 25, 2025Updated 10 months ago
- β538Nov 20, 2021Updated 4 years ago
- Unlocking Serverless Computing to Assess Security Controlsβ262Mar 15, 2024Updated last year
- NTLM relaying for Windows made easyβ579Apr 25, 2023Updated 2 years ago
- Enumerate Domain Dataβ336Sep 13, 2023Updated 2 years ago
- Hide your payload in DNSβ614May 3, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,168Sep 29, 2021Updated 4 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sysβ¦β492Jul 23, 2020Updated 5 years ago
- Retrieve LAPS password from LDAPβ435Feb 17, 2021Updated 5 years ago
- A User Impersonation tool - via Token or Shellcode injectionβ421May 21, 2022Updated 3 years ago