swisskyrepo / NepheleesLinks
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆36Updated 4 years ago
Alternatives and similar repositories for Nephelees
Users that are interested in Nephelees are comparing it to the libraries listed below
Sorting:
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- The hacker technical cheat sheet☆40Updated last week
- WebHook for Red Team☆26Updated 4 years ago
- Legba recipes.☆50Updated 10 months ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- A python network scanner using scapy☆23Updated 5 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆23Updated last week
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Upgrading jsleak with a CI/CD and new rules☆15Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 11 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago