gl4ssesbo1 / NebulaLinks
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆626Updated 5 months ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆668Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆469Updated last year
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆632Updated 7 months ago
- Script for generating revshells☆478Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆732Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆343Updated 8 months ago
- A RedTeam Toolkit☆409Updated 3 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆515Updated this week
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆385Updated last year
- PeTeReport is an open-source application vulnerability reporting tool.☆525Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- Red Team Attack Lab for TTP testing & research☆582Updated 2 years ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆800Updated 3 weeks ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 8 months ago
- ☆584Updated last week
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆643Updated 3 weeks ago
- Compiled tools for internal assessments☆361Updated this week
- ☆811Updated last week
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆570Updated 6 months ago
- Sandman is a NTP based backdoor for hardened networks.☆811Updated last year
- ☆706Updated this week
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆295Updated 2 weeks ago
- Identify privilege escalation paths within and across different clouds☆705Updated 2 weeks ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆397Updated 2 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,233Updated 8 months ago
- An offensive data enrichment pipeline☆868Updated this week
- Divide full port scan results and use it for targeted Nmap runs☆329Updated last year