cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH
☆61Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for cloud-proxy
Users that are interested in cloud-proxy are comparing it to the libraries listed below
Sorting:
- ☆42Jul 23, 2018Updated 7 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- TCP port scanning through SYN flood protected networks☆47Nov 28, 2017Updated 8 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 3 months ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 7 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated 2 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- A Python Typer-based CLI tool to check IP addresses against Azure services. It also uses Rich for some dope console output. Additionally,…☆21Mar 6, 2023Updated 3 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆24Dec 17, 2021Updated 4 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago