nicolasriverocorvalan / cloud-sniperLinks
Virtual Security Operations Center
☆51Updated last year
Alternatives and similar repositories for cloud-sniper
Users that are interested in cloud-sniper are comparing it to the libraries listed below
Sorting:
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Security checks for your researches☆33Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Windows Security Logging☆43Updated 2 years ago
- ☆21Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆70Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- ☆32Updated 7 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆31Updated 2 years ago
- ☆18Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆10Updated 4 years ago