swisskyrepo / Nephelees
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆34Updated 4 years ago
Alternatives and similar repositories for Nephelees:
Users that are interested in Nephelees are comparing it to the libraries listed below
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Source of swisskyrepo.github.io - Public☆22Updated 5 months ago
- WebHook for Red Team☆25Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- A python network scanner using scapy☆23Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Upgrading jsleak with a CI/CD and new rules☆15Updated last year
- ☆9Updated 2 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆10Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- A proving grounds for young and aspiring BBOT modules☆14Updated 2 years ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago