Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆36Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for Nephelees
Users that are interested in Nephelees are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A webpage monitor bot, currently used to monitor Twitter ToS.☆19Nov 10, 2022Updated 3 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- Network Policy Helper☆30Updated this week
- Static Website Generator☆25Oct 2, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A demo showing how to harvest credentials from Zapier☆16Aug 30, 2022Updated 3 years ago
- ☆15Sep 4, 2024Updated last year
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆14Mar 31, 2022Updated 3 years ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆17Nov 21, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- Bypass captive portals by impersonating inactive users☆77Jan 21, 2015Updated 11 years ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 11 months ago
- Spy on your friend Android App☆12Feb 13, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- ☆81Nov 2, 2019Updated 6 years ago