blackhatethicalhacking / ctfrLinks
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆28Updated 6 years ago
Alternatives and similar repositories for ctfr
Users that are interested in ctfr are comparing it to the libraries listed below
Sorting:
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- Tool for dictionary attack with fail2ban bypass.☆10Updated 7 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Updated 6 years ago
- A collection of my Dockerfiles☆90Updated 3 years ago
- ☆54Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- ☆76Updated 7 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- 504 VSAgent☆25Updated 7 years ago
- ☆98Updated 6 years ago
- A tool to abuse Exchange services☆18Updated 6 years ago
- ☆167Updated 5 years ago
- Discover target social media profiles☆81Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Simulating Adversary Operations☆97Updated 7 years ago
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆149Updated 3 years ago
- Just a collection of pentest stuffs☆94Updated 6 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Updated 6 years ago
- WIP - Revamped Alfred [2.0]☆40Updated 9 months ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- ☆80Updated 6 years ago