gl4ssesbo1 / NebulaLinks
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆625Updated 4 months ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆668Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Script for generating revshells☆474Updated last year
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆627Updated 6 months ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆383Updated last year
- A RedTeam Toolkit☆407Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆611Updated 11 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆341Updated 7 months ago
- PeTeReport is an open-source application vulnerability reporting tool.☆521Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆721Updated last month
- Pentesting automation platform that combines hacking tools to complete assessments☆513Updated last week
- Compiled tools for internal assessments☆360Updated last week
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 7 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,216Updated 7 months ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆796Updated 2 weeks ago
- Red Team Attack Lab for TTP testing & research☆579Updated 2 years ago
- ☆572Updated last month
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆316Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,039Updated 11 months ago
- ☆701Updated this week
- ☆806Updated 2 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆559Updated 5 months ago
- Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive mana…☆411Updated last month
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆305Updated 2 years ago
- PowerShell Ransomware Simulator with C2 Server☆489Updated last year
- Dominate Active Directory with PowerShell.☆1,062Updated last week
- Pentester's Promiscuous Notebook☆506Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆805Updated 6 months ago