Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services
☆24Jan 21, 2021Updated 5 years ago
Alternatives and similar repositories for clovery
Users that are interested in clovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆57Sep 27, 2022Updated 3 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- ☆12Aug 10, 2024Updated last year
- A library to parse macOS LoginItems☆18Aug 28, 2022Updated 3 years ago
- ☆41Oct 8, 2024Updated last year
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Tools for analyzing Windows containers and break container's isolation☆33Aug 2, 2022Updated 3 years ago
- Basic SOCKS 5 client library in Tcl.☆13Aug 6, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Golang的工具库(Tools of Golang)☆14Updated this week
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆169Aug 10, 2020Updated 5 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- A .git/ folder disclosure exploit☆21Jul 14, 2019Updated 6 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago