tophat-cloud / cumulusLinks
Cumulus is web application weakness monitoring, works with just 3 code lines
☆40Updated 2 years ago
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- ☆18Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- An exotic service bruteforce tool.☆14Updated 3 months ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- parsers to make life easier☆13Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆12Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- HTTP discovery and change monitoring tool☆12Updated 5 months ago
- Standardizing Security Titles☆13Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago