Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services
☆24Jan 21, 2021Updated 5 years ago
Alternatives and similar repositories for clovery
Users that are interested in clovery are comparing it to the libraries listed below
Sorting:
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Enumerate subdomains by parsing Rapid7 FDNS dumps and CA transparency logs☆26Apr 26, 2019Updated 6 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- Tools for analyzing Windows containers and break container's isolation☆32Aug 2, 2022Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- Dump exposed HTTP .git fast☆51Nov 11, 2022Updated 3 years ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- Simple C# implementation of PowerUpSQL☆95Jul 8, 2024Updated last year
- ☆23Feb 9, 2018Updated 8 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- ☆57Sep 27, 2022Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- C# .NET Assembly to perform LDAP Queries☆27Apr 1, 2021Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- ☆80Jan 26, 2025Updated last year
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A .git/ folder disclosure exploit☆22Jul 14, 2019Updated 6 years ago