tophat-cloud / cumulusLinks
Cumulus is web application weakness monitoring, works with just 3 code lines
☆40Updated 2 years ago
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- BPFDoor Scanner - Check for Compromised Hosts☆42Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Tools for hunting security threats☆12Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆28Updated 11 months ago
- An exotic service bruteforce tool.☆14Updated 7 months ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Ideaslocas Repository☆37Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 4 years ago
- Post-exploitation tool☆26Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Digitalis's Security Lab☆11Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆23Updated 6 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago