☆60May 25, 2023Updated 2 years ago
Alternatives and similar repositories for cowcloud
Users that are interested in cowcloud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆114Jun 8, 2023Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- Shell scripts☆13Nov 10, 2020Updated 5 years ago
- Define and run multi-container applications with Docker https://git.io/whaler-wiki☆20Nov 28, 2025Updated 3 months ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- A collection of web browser CTF challenges and solutions.☆33Dec 30, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- CVE-2022-1388 F5 BIG-IP iControl REST RCE☆37May 9, 2022Updated 3 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- ShiftLeft Scan is a free and open-source commercial-grade security tool for modern DevOps teams.☆13Dec 30, 2022Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year