blackhatethicalhacking / CloudFail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆28Updated 5 years ago
Alternatives and similar repositories for CloudFail:
Users that are interested in CloudFail are comparing it to the libraries listed below
- The New Hacking Framework☆18Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- ☆24Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 3 years ago
- ☆12Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- ☆51Updated 3 years ago
- Custom pentesting tools☆24Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Automatically spin up infra for phishing☆63Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆24Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago