cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH
☆61Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for cloud-proxy
Users that are interested in cloud-proxy are comparing it to the libraries listed below
Sorting:
- ☆42Jul 23, 2018Updated 7 years ago
- Trivial unixey pentest utilities☆56Feb 23, 2024Updated 2 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- blacksheepwall is a hostname reconnaissance tool☆301Apr 25, 2020Updated 5 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 2 months ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- TCP port scanning through SYN flood protected networks☆46Nov 28, 2017Updated 8 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 6 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated last year
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆144Oct 31, 2017Updated 8 years ago