blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 6 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆30Updated 6 years ago
- The New Hacking Framework☆18Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- ☆14Updated 6 months ago
- Wireless Pentesting Device☆24Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- Docker images for learning wifi hacking☆70Updated 7 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- ☆53Updated 4 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Rogue Access Point Detector☆37Updated last year
- Red Team Tool Kit☆16Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- ☆12Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆74Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- ☆25Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- ☆33Updated 10 months ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year