cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH
☆61Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for cloud-proxy
Users that are interested in cloud-proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆42Jul 23, 2018Updated 7 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 6 years ago
- TCP port scanning through SYN flood protected networks☆47Nov 28, 2017Updated 8 years ago
- ☆28Apr 4, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- An OSINT employee/username enumeration tool☆67Dec 15, 2025Updated 4 months ago
- This script is a multi-threaded Okta password sprayer.☆72Jan 5, 2024Updated 2 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 5 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆294May 2, 2024Updated last year
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- An Office365 User Attack Tool☆651Mar 19, 2024Updated 2 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- A Python Typer-based CLI tool to check IP addresses against Azure services. It also uses Rich for some dope console output. Additionally,…☆21Mar 6, 2023Updated 3 years ago
- A tool for discovering subdomains via third party services and wordlists.☆74Apr 14, 2016Updated 10 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆25Dec 17, 2021Updated 4 years ago
- ☆13Apr 29, 2016Updated 10 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago