blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 6 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- Simple Karma Attack☆69Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- ☆53Updated 4 years ago
- ☆33Updated 8 months ago
- ☆15Updated 3 months ago
- ☆24Updated 5 years ago
- ☆17Updated 6 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- ☆12Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆57Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago