JoelGMSec / CloudtopolisLinks
Zero Infrastructure Password Cracking
☆405Updated 9 months ago
Alternatives and similar repositories for Cloudtopolis
Users that are interested in Cloudtopolis are comparing it to the libraries listed below
Sorting:
- large hashcat rulesets generated from real-world compromised passwords☆395Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆297Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆366Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated 11 months ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆379Updated 6 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆435Updated last year
- A polyglot payload generator☆241Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆766Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆436Updated 9 months ago
- A web front-end for password cracking and analytics☆379Updated 3 weeks ago
- A WLAN red team framework.☆155Updated 7 months ago
- Automatic Service Enumeration Script☆226Updated 2 years ago
- ☆150Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,085Updated 2 months ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆198Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆483Updated 11 months ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆330Updated 4 years ago
- Hiding GoPhish from the boys in blue☆183Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆321Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.☆516Updated last month
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆449Updated 3 years ago
- An Office365 User Attack Tool☆636Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆315Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆871Updated 6 months ago