Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services
☆24Jan 21, 2021Updated 5 years ago
Alternatives and similar repositories for clovery
Users that are interested in clovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Grab the content of lots of websites in parallel☆18Jan 21, 2024Updated 2 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆57Sep 27, 2022Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Aug 5, 2024Updated last year
- CTF writeups by ./Vespiary☆15Nov 12, 2023Updated 2 years ago
- ☆11Aug 10, 2024Updated last year
- ☆42Oct 8, 2024Updated last year
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- Tools for analyzing Windows containers and break container's isolation☆33Aug 2, 2022Updated 3 years ago
- Basic SOCKS 5 client library in Tcl.☆13Aug 6, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆94Aug 9, 2024Updated last year
- Golang的工具库(Tools of Golang)☆14May 11, 2026Updated last week
- ☆11Aug 27, 2020Updated 5 years ago
- ☆88Jan 26, 2025Updated last year
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago