gl4ssesbo1 / NebulaLinks
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆626Updated 6 months ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆672Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆342Updated 9 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆738Updated last week
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆386Updated last year
- Script for generating revshells☆479Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- A RedTeam Toolkit☆408Updated 4 months ago
- Red Team Attack Lab for TTP testing & research☆585Updated 2 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆631Updated 8 months ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 9 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆517Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆808Updated this week
- PeTeReport is an open-source application vulnerability reporting tool.☆527Updated last year
- An offensive data enrichment pipeline☆879Updated this week
- Sandman is a NTP based backdoor for hardened networks.☆812Updated last year
- Compiled tools for internal assessments☆363Updated last week
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- ☆592Updated this week
- Identify privilege escalation paths within and across different clouds☆705Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆656Updated last month
- ☆712Updated last week
- ☆438Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆318Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆403Updated 10 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆307Updated 2 years ago
- ☆300Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,240Updated 8 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆399Updated 7 months ago
- Divide full port scan results and use it for targeted Nmap runs☆327Updated last year