blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 5 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- The New Hacking Framework☆18Updated 8 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- Create visualization from Shodan query☆73Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- ☆12Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- ☆24Updated 5 years ago
- ☆15Updated this week
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆33Updated 4 months ago
- Simple Karma Attack☆69Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 4 months ago
- recon-ng modules for Censys☆37Updated last year
- Red Team Tool Kit☆16Updated 6 years ago