vulnz / cloudfailed
☆16Updated 6 years ago
Alternatives and similar repositories for cloudfailed:
Users that are interested in cloudfailed are comparing it to the libraries listed below
- Different methods to obfuscate URLs☆30Updated 7 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆59Updated 4 years ago
- Generate users list using certain format☆23Updated 6 years ago
- Admin Panel Finder☆38Updated last year
- Quick OSINT checks for IPs and Domains during triage and investigations.☆27Updated 7 months ago
- My dotfiles for Linux boxes☆41Updated last week
- Exploit Pack - Project☆71Updated 5 years ago
- reverse socks tunneler with ntlm and proxy support☆28Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Apache server-status link parser☆24Updated 5 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆20Updated 4 years ago
- ☆18Updated 6 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Awesome Hacking☆20Updated 6 years ago
- A tool that automates MAC address and hostname spoofing☆59Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- Build interactive map of cameras from Shodan☆22Updated 5 years ago
- Security checks for your researches☆33Updated 4 years ago
- Repository of tools used in my blog☆50Updated 10 months ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆60Updated 3 years ago
- Various wordlists for bruteforce☆32Updated 3 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- Useful collection of scapy-scripts and more☆26Updated 7 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- ☆50Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago