A script to automate the creation of cloud infrastructure for hash cracking.
☆15Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for cloudcat
Users that are interested in cloudcat are comparing it to the libraries listed below
Sorting:
- Exploits solution for CrackLatinos challenges☆17Sep 29, 2019Updated 6 years ago
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- IPv6CC implements several covert channels targeting the IPv6 protocol.☆11May 17, 2022Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- Read any file from anywhere - local, HTTP, S3, FTP, compressed or not.☆19Mar 6, 2026Updated 2 weeks ago
- ☆20Apr 21, 2020Updated 5 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- This Python tool uses PimEyes for reverse image searches, returning links to pages where matches are found, useful for investigations and…☆11Sep 12, 2024Updated last year
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆12May 9, 2023Updated 2 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Diving into Popularity of GitHub Repositories☆13Sep 15, 2023Updated 2 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 2 months ago
- ☆16Aug 20, 2017Updated 8 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆19Feb 19, 2026Updated last month
- ☆19Jul 25, 2025Updated 7 months ago
- Two-factor Bitcoin (BIP38)☆36Mar 22, 2015Updated 10 years ago
- Simple tool for exploiting JWT vulnerabilities☆13Dec 1, 2025Updated 3 months ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last month
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆42Mar 5, 2026Updated 2 weeks ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- VK face grabber☆14Oct 12, 2021Updated 4 years ago
- Personal Hidden Git Server☆25Aug 28, 2022Updated 3 years ago
- ☆19Sep 2, 2024Updated last year
- download higher resolution photo from vk.com☆10Aug 30, 2021Updated 4 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago