Pinned Repositories
auto-harvest
auto-harvest is a Python script that automates the bulk downloading of files based on URL patterns with customizable placeholders. It’s ideal for scenarios where you have URL patterns and wordlists to substitute into the URLs, allowing for systematic, automated file retrieval.
Awsome-Redis-Rogue-Server
Redis-Rogue-Server Implement
Azure-AD-Connect-Credential-Extractor
This PowerShell script is designed for authorized penetration testing and security labs to extract and decrypt credentials from Azure AD Connect Sync configurations. The script connects to the ADSync SQL database, retrieves cryptographic keys, and decrypts the AD Connect credentials used for Active Directory synchronization.
bulk-metadata-extractor
auto-extractor.sh is a shell script that automates metadata extraction for all files in a specified directory. This script uses ExifTool to extract metadata and allows you to save the results to an output file.
cme-nxc-cheat-sheet
A cheat sheet for CrackMapExec and NetExec
fipp
fipp.py is a flexible, interactive password processor that filters and customizes password lists based on length, special characters, numbers, uppercase requirements, and encoding, with both command-line and interactive modes.
LockFly
LockFly is a simple secure file transfer application designed to facilitate the secure and encrypted transfer of files between devices. Leveraging Python's cryptography library, LockFly ensures data remains confidential and protected during transit.
OSCP-Pentesting-Cheatsheet
A general purpose cheat sheet for pentesting and OSCP certification
OSCP-Prep-1
A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam
subdomain-enum
This Bash script automates subdomain enumeration, live domain checking, port scanning, and data extraction from the Wayback Machine. It integrates various tools such as assetfinder, httprobe, subjack, nmap, and waybackurls to conduct reconnaissance on a target domain. Inspried from the CyberMentor
CloudyKhan's Repositories
CloudyKhan/fipp
fipp.py is a flexible, interactive password processor that filters and customizes password lists based on length, special characters, numbers, uppercase requirements, and encoding, with both command-line and interactive modes.
CloudyKhan/OSCP-Pentesting-Cheatsheet
A general purpose cheat sheet for pentesting and OSCP certification
CloudyKhan/auto-harvest
auto-harvest is a Python script that automates the bulk downloading of files based on URL patterns with customizable placeholders. It’s ideal for scenarios where you have URL patterns and wordlists to substitute into the URLs, allowing for systematic, automated file retrieval.
CloudyKhan/Azure-AD-Connect-Credential-Extractor
This PowerShell script is designed for authorized penetration testing and security labs to extract and decrypt credentials from Azure AD Connect Sync configurations. The script connects to the ADSync SQL database, retrieves cryptographic keys, and decrypts the AD Connect credentials used for Active Directory synchronization.
CloudyKhan/bulk-metadata-extractor
auto-extractor.sh is a shell script that automates metadata extraction for all files in a specified directory. This script uses ExifTool to extract metadata and allows you to save the results to an output file.
CloudyKhan/cme-nxc-cheat-sheet
A cheat sheet for CrackMapExec and NetExec
CloudyKhan/LockFly
LockFly is a simple secure file transfer application designed to facilitate the secure and encrypted transfer of files between devices. Leveraging Python's cryptography library, LockFly ensures data remains confidential and protected during transit.
CloudyKhan/OSCP-Prep-1
A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam
CloudyKhan/OSCP-Tricks-2023
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
CloudyKhan/SimpleTCPChatServer
A collection of infosec projects
CloudyKhan/subdomain-enum
This Bash script automates subdomain enumeration, live domain checking, port scanning, and data extraction from the Wayback Machine. It integrates various tools such as assetfinder, httprobe, subjack, nmap, and waybackurls to conduct reconnaissance on a target domain. Inspried from the CyberMentor
CloudyKhan/subdomain-finder
This Bash script uses `assetfinder` to gather subdomains for a given domain and then filters the results to only include subdomains belonging to the target domain. It is a useful tool for initial reconnaissance during penetration testing or OSINT activities.
CloudyKhan/username-generator
This Python script is designed to generate usernames from concatenated full names using a variety of predefined formats. It can also apply custom username formats, append domain handles, and add common number patterns (like those often used in Windows environments). Simple alternative to username-anarchy
CloudyKhan/spn-enum
spn enumeration script for active directory - makes fast enumeration a little more convenient.
CloudyKhan/SweetScan
SweetScan is a user-friendly network scanning tool that leverages the power of `nmap` to perform detailed network scans. It simplifies the use of `nmap` by providing a set of predefined scan types, multi-threaded scanning, and options for output formatting.
CloudyKhan/Windows-Privilege-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course