moscovium-mc / CloudRipView external linksLinks
A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.
☆314Dec 5, 2025Updated 2 months ago
Alternatives and similar repositories for CloudRip
Users that are interested in CloudRip are comparing it to the libraries listed below
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- ☆55Nov 18, 2025Updated 2 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆30Dec 18, 2025Updated last month
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆63Jan 21, 2025Updated last year
- Generate backdoored RSA keys using SETUP☆232Dec 1, 2025Updated 2 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆33Jan 4, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆56Feb 8, 2026Updated last week
- A tool for hacking into publicly exposed network cameras, with support for specifying country and region.☆383Updated this week
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆114Oct 30, 2025Updated 3 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129May 12, 2025Updated 9 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 4 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated 11 months ago
- A Remote Access Tool developed in C#, enabling complete control of a remote Windows machine, designed for legitimate remote administratio…☆130Updated this week
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆64Nov 9, 2025Updated 3 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆49Dec 14, 2025Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆449Feb 7, 2026Updated last week
- ☆68Jan 16, 2025Updated last year
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆244Dec 16, 2025Updated 2 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆233Feb 9, 2026Updated last week
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆37Jul 27, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆78Feb 6, 2026Updated last week
- BurpSuite extensions -Bypass Suite☆26Jul 19, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆82Jun 11, 2025Updated 8 months ago
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated last week
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆102Jan 9, 2026Updated last month
- ☆30Jan 16, 2026Updated last month
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- ☆96Apr 3, 2025Updated 10 months ago
- Detect AES and RSA keys in a memory dump.☆14Jul 28, 2016Updated 9 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago