gl4ssesbo1 / Nebula
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆560Updated 2 months ago
Alternatives and similar repositories for Nebula:
Users that are interested in Nebula are comparing it to the libraries listed below
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆630Updated 10 months ago
- A RedTeam Toolkit☆395Updated 3 weeks ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆544Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,070Updated last month
- Script for generating revshells☆468Updated 7 months ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆390Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆327Updated last month
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆487Updated 5 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆489Updated 2 years ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆375Updated 11 months ago
- A library for detecting known secrets across many web frameworks☆622Updated this week
- ☆317Updated 3 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 8 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆358Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- PEN-300 collection to help you on your exam.☆538Updated last year
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆850Updated last week
- Kraken, a modular multi-language webshell coded by @secu_x11☆543Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆786Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆299Updated 8 months ago
- Red Team Attack Lab for TTP testing & research☆566Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆343Updated 8 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 5 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,091Updated 2 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆689Updated 6 months ago
- Awesome cloud enumerator☆1,003Updated last month
- PeTeReport is an open-source application vulnerability reporting tool.☆501Updated 10 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆664Updated last week
- ☆315Updated this week