Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
☆36Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for Nephelees
Users that are interested in Nephelees are comparing it to the libraries listed below
Sorting:
- Simple script for the WHID injector - a rubberducky wifi☆119Jul 16, 2024Updated last year
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆470Sep 22, 2019Updated 6 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Retrieve LAPS password from LDAP☆435Feb 17, 2021Updated 5 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 4 months ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆17Nov 21, 2024Updated last year
- Bypass captive portals by impersonating inactive users☆77Jan 21, 2015Updated 11 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆31Oct 27, 2024Updated last year
- Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex☆419Feb 27, 2025Updated last year
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Frontend Of TheRarBg☆14Aug 27, 2023Updated 2 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Network Policy Helper☆30Feb 9, 2026Updated last month
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆22May 29, 2020Updated 5 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- ☆81Nov 2, 2019Updated 6 years ago