SafeBreach-Labs / CloudMinerLinks
Execute code using Azure Automation service without getting charged
☆143Updated last year
Alternatives and similar repositories for CloudMiner
Users that are interested in CloudMiner are comparing it to the libraries listed below
Sorting:
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
 - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
 - A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
 - Capture screenshots of onion services on an onion service.☆72Updated last year
 - Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
 - Web Path Finder☆61Updated last year
 - The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
 - Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
 - Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Updated last year
 - Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
 - Ready to go Phishing Platform☆56Updated last year
 - A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
 - This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
 - Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
 - Browser streaming MITM proxy☆74Updated 2 years ago
 - Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
 - hiding in plain sight: part 2☆45Updated last year
 - A DMARC scanning and parsing tool.☆33Updated 6 months ago
 - A script to automate keystrokes through a graphical desktop program.☆34Updated 4 months ago
 - Visualize BBOT scans in realtime with VivaGraphJS☆56Updated 11 months ago
 - Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
 - Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
 - Social Engineering Browser Update Attack.☆56Updated last year
 - quick and dirty proof-of-concept to hide shells in images☆51Updated last year
 - FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
 - Information stealer logs parser☆81Updated last year
 - A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
 - 🕵️ Email osint tool☆62Updated 2 years ago
 - Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year