lordsaibat / Cloud_crackLinks
Crack passwords using Terraform and AWS
☆44Updated 6 years ago
Alternatives and similar repositories for Cloud_crack
Users that are interested in Cloud_crack are comparing it to the libraries listed below
Sorting:
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- 504 VSAgent☆23Updated 7 years ago
- Simple parser framework.☆26Updated 2 years ago
- Pypykatz server☆125Updated 6 years ago
- ☆54Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 8 months ago
- Responsive Command and Control System☆104Updated 2 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- ☆76Updated 7 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- This is a bash script to bypass 802.1x NAC☆99Updated 2 years ago
- Helps with finding and registering categorized domains☆69Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 8 months ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- ☆140Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 11 months ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆168Updated 7 years ago