tophat-cloud / cumulusLinks
Cumulus is web application weakness monitoring, works with just 3 code lines
☆40Updated 2 years ago
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- BPFDoor Scanner - Check for Compromised Hosts☆42Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- An exotic service bruteforce tool.☆13Updated 7 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 5 years ago
- 오펜시브 시큐리티 TTP, 정보, 그리고 대응 방안을 분석하고 공유하는 프로젝트입니다. 정보보안 업계 종사자들과 학생들에게 도움이 되었으면 좋겠습니다.☆74Updated 8 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- ☆18Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 4 years ago
- Hackable Windows SandBox environment☆31Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- ☆12Updated 2 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 4 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆13Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- ☆12Updated 3 years ago