swisskyrepo / NepheleesLinks
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆35Updated 5 years ago
Alternatives and similar repositories for Nephelees
Users that are interested in Nephelees are comparing it to the libraries listed below
Sorting:
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated this week
- The hacker technical cheat sheet☆43Updated 6 months ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Legba recipes.☆51Updated last year
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆17Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- ☆33Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- The official command-line client for spyse.com☆49Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Code to check AWS S3 buckets☆17Updated 8 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago