vulnz / cloudfailed
☆16Updated 6 years ago
Alternatives and similar repositories for cloudfailed:
Users that are interested in cloudfailed are comparing it to the libraries listed below
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆59Updated 4 years ago
- HTTP botnet☆60Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Create visualization from Shodan query☆71Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- A tool that automates MAC address and hostname spoofing☆58Updated 5 years ago
- Collection of various wordlists☆32Updated 5 years ago
- Admin Panel Finder☆39Updated last year
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- Build interactive map of cameras from Shodan☆22Updated 5 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆20Updated 4 years ago
- Different methods to obfuscate URLs☆30Updated 7 years ago
- Useful collection of scapy-scripts and more☆25Updated 6 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 4 years ago
- ☆47Updated 3 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆65Updated 6 years ago
- Various wordlists for bruteforce☆32Updated 3 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 4 years ago
- Automated Tools Pentest☆7Updated last year
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆39Updated 2 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year