tophat-cloud / cumulusLinks
Cumulus is web application weakness monitoring, works with just 3 code lines
☆40Updated 2 years ago
Alternatives and similar repositories for cumulus
Users that are interested in cumulus are comparing it to the libraries listed below
Sorting:
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- BPFDoor Scanner - Check for Compromised Hosts☆40Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Tools for hunting security threats☆12Updated 5 years ago
- An exotic service bruteforce tool.☆14Updated 4 months ago
- Free Email Providers☆11Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- 오펜시브 시큐리티 TTP, 정보, 그리고 대응 방안을 분석하고 공유하는 프로젝트입니다. 정보보안 업계 종사자들과 학생들에게 도움이 되었으면 좋겠습니다.☆65Updated 5 months ago
- ☆18Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆16Updated 7 months ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Post-exploitation tool☆26Updated 4 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 7 years ago