Resolves an IP address to the cloud provider it is hosted on
☆101Feb 18, 2026Updated last week
Alternatives and similar repositories for ip2provider
Users that are interested in ip2provider are comparing it to the libraries listed below
Sorting:
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆573Jul 3, 2025Updated 7 months ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,077Mar 19, 2024Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Find exposed data in Azure with this public blob scanner☆350Jul 7, 2024Updated last year
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Discover Printers☆169Sep 18, 2019Updated 6 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Search for potential frontable domains☆642Mar 22, 2023Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Feb 10, 2023Updated 3 years ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆302Mar 4, 2020Updated 5 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,802Sep 17, 2024Updated last year
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Chameleon: A tool for evading Proxy categorisation☆514Nov 28, 2024Updated last year
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,258Mar 19, 2025Updated 11 months ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year