blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 6 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- Simple Karma Attack☆68Updated 5 years ago
- ☆12Updated 5 years ago
- Rogue Access Point Detector☆36Updated last year
- ☆25Updated 5 years ago
- An Instagram Open Source Intelligence Tool☆22Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 3 months ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- ☆53Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- ☆33Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- brute force SSH public-key authentication☆78Updated 8 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 7 years ago
- ☆14Updated 8 months ago
- Automated Penetration Testing Framework☆35Updated 6 years ago