gl4ssesbo1 / NebulaLinks
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆623Updated 3 months ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆657Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a…☆381Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆714Updated last month
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆339Updated 6 months ago
- ☆540Updated 2 weeks ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆786Updated 2 months ago
- A RedTeam Toolkit☆407Updated last month
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆626Updated 5 months ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆407Updated 6 months ago
- Script for generating revshells☆476Updated last year
- ☆804Updated last month
- Red Team Attack Lab for TTP testing & research☆578Updated 2 years ago
- PeTeReport is an open-source application vulnerability reporting tool.☆520Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆806Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆596Updated 10 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,191Updated 5 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆532Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆314Updated last year
- Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive mana…☆401Updated this week
- ☆690Updated this week
- An offensive data enrichment pipeline☆840Updated this week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Compiled tools for internal assessments☆357Updated last week
- Pentesting automation platform that combines hacking tools to complete assessments☆509Updated last week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,037Updated 10 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆546Updated 4 months ago
- Identify privilege escalation paths within and across different clouds☆701Updated 2 weeks ago
- ☆433Updated last year