TepidJesus / CloudCrackLinks
[RELEASED] A CLI tool for large-scale password recovery operations using AWS
☆29Updated 2 years ago
Alternatives and similar repositories for CloudCrack
Users that are interested in CloudCrack are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- Script to perform some hashcracking logic automagically☆81Updated 2 weeks ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Windows priviledge escalation script☆12Updated 9 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆135Updated last year
- A script to automate keystrokes through a graphical desktop program.☆34Updated 5 months ago
- ☆42Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆47Updated last month
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last month
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆127Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 2 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆25Updated 2 months ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆15Updated last year
- ☆23Updated 4 years ago
- Browser streaming MITM proxy☆75Updated 2 years ago
- Wappalyzer CLI tool to find Web Technologies☆61Updated 2 years ago
- Gather information from an email address connected to Office 365☆86Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Hunting for passwords with deep learning☆232Updated last year
- Custom rules by cyclone☆15Updated 4 months ago
- Collection of hashcat lists and things.☆52Updated 5 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆89Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 9 months ago