A fast enumeration tool for publicly exposed Azure Storage blobs.
☆117Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for goblob
Users that are interested in goblob are comparing it to the libraries listed below
Sorting:
- Azure Service Subdomain Enumeration☆72Sep 2, 2024Updated last year
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated 2 months ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Mar 17, 2023Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Make URL path combinations using a wordlist☆171Sep 25, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆112Dec 11, 2023Updated 2 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆209Aug 12, 2024Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆458Oct 3, 2023Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Azure Data Exporter for BloodHound☆877Updated this week
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆487Sep 24, 2025Updated 5 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Jan 19, 2023Updated 3 years ago
- ☆14Jul 21, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Mar 3, 2026Updated 2 weeks ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,143Feb 21, 2026Updated last month