primait / nuvolaView external linksLinks
☆142Feb 8, 2026Updated last week
Alternatives and similar repositories for nuvola
Users that are interested in nuvola are comparing it to the libraries listed below
Sorting:
- An open source framework to easily build and deploy eBPF/XDP network monitoring probes and clusters in order to perform Service Programs …☆25Jun 1, 2022Updated 3 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Updated this week
- ☆30Jul 28, 2024Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆13Oct 24, 2024Updated last year
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Nov 30, 2022Updated 3 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆482Jul 9, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆409Jan 19, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 2 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆337Dec 12, 2025Updated 2 months ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Mar 29, 2023Updated 2 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 9 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,231Feb 4, 2026Updated last week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- Open Source Cloud Security☆727Oct 26, 2023Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆217Jan 18, 2023Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated last month
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated last month
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Apr 5, 2024Updated last year