blackhatethicalhacking / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 6 years ago
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- ☆12Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- The New Hacking Framework☆18Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 7 years ago
- ☆25Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- ☆33Updated 11 months ago
- Simple Karma Attack☆68Updated 5 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 2 months ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Automatically spin up infra for phishing☆65Updated 5 years ago
- ☆14Updated 7 months ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Rogue Access Point Detector☆36Updated last year