blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 6 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- ☆53Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- ☆33Updated last year
- The New Hacking Framework☆18Updated 8 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Rogue Access Point Detector☆36Updated last year
- A toolkit to attack Office365☆16Updated 6 years ago
- ☆25Updated 5 years ago
- Simple Karma Attack☆68Updated 5 years ago
- An Instagram Open Source Intelligence Tool☆22Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- ☆12Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆216Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Automatically spin up infra for phishing☆65Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 5 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago