Simple script you can use to convert and obscure any IP address of any host.
☆111Sep 26, 2021Updated 4 years ago
Alternatives and similar repositories for Obscure-IP-Obfuscator
Users that are interested in Obscure-IP-Obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- 4.55 kernel dumping POC with patches☆15Mar 20, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- ☆58Jul 16, 2017Updated 8 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- ☆16Jan 15, 2018Updated 8 years ago
- ☆40Jan 14, 2018Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Embed and hide any file in an HTML file☆491Sep 27, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆162Jul 27, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago