Rnalter / ThunderCloudView external linksLinks
Cloud Exploit Framework
☆112May 11, 2022Updated 3 years ago
Alternatives and similar repositories for ThunderCloud
Users that are interested in ThunderCloud are comparing it to the libraries listed below
Sorting:
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- PoC-Malware-TTPs☆49Mar 26, 2023Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- An XSS Exploitation Tool☆337Dec 5, 2025Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆109Feb 21, 2023Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Nov 30, 2022Updated 3 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆147Feb 1, 2026Updated 2 weeks ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Feb 20, 2024Updated last year
- A Command and Control (C2)☆305May 4, 2023Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- ☆160Nov 26, 2023Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166May 6, 2023Updated 2 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Jan 22, 2025Updated last year
- Kubernetes exploitation tool☆363Jul 26, 2024Updated last year
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆345Jun 6, 2022Updated 3 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆172Nov 17, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆337Dec 12, 2025Updated 2 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- ☆34Apr 24, 2024Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆563Jan 20, 2026Updated 3 weeks ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Diana Credential Recovery Framework☆66Jan 19, 2026Updated 3 weeks ago