stormfleet / cloudcat
A script to automate the creation of cloud infrastructure for hash cracking.
☆16Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for cloudcat
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Subdomain Enumeration and Scanner☆32Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆24Updated 2 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- MimeCast Password Spraying Tool☆44Updated 5 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆57Updated 6 years ago
- ☆16Updated 7 years ago
- ☆22Updated 3 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago