[RELEASED] A CLI tool for large-scale password recovery operations using AWS
☆29Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for CloudCrack
Users that are interested in CloudCrack are comparing it to the libraries listed below
Sorting:
- ☆31Feb 27, 2026Updated last week
- The ExploitToolFinder Utility [by exploitsecurity.io] assists security researchers in their quest to find the right tool for the job☆17Jun 21, 2023Updated 2 years ago
- Functional training suite for machine learning in the terminal☆13Jun 10, 2025Updated 9 months ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 8 months ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- The ultimate phishing tool with 38 websites available!☆16Nov 7, 2024Updated last year
- ☆12Feb 4, 2025Updated last year
- “When Intelligence shines, money glitters and success follows!!!”. Are you the next Billionaire is a a gaming software inspired by the …☆22Apr 11, 2022Updated 3 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- ☆46Oct 27, 2023Updated 2 years ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- Common tools for analysis☆11Jun 3, 2025Updated 9 months ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- A web crawler in PHP☆12Aug 16, 2018Updated 7 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago
- A simple and efficient TPU (Transaction Processing Unit) client for Solana, utilizing the QUIC protocol for data transmission.☆21Dec 14, 2024Updated last year
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- ☆14Nov 12, 2021Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago