swisskyrepo / Nephelees
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆35Updated 4 years ago
Alternatives and similar repositories for Nephelees:
Users that are interested in Nephelees are comparing it to the libraries listed below
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Upgrading jsleak with a CI/CD and new rules☆15Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- ☆9Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Source of swisskyrepo.github.io - Public☆23Updated last week
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Code to check AWS S3 buckets☆17Updated 7 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- ☆33Updated 3 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆26Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago