Simple script you can use to convert and obscure any IP address of any host.
☆111Sep 26, 2021Updated 4 years ago
Alternatives and similar repositories for Obscure-IP-Obfuscator
Users that are interested in Obscure-IP-Obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerDNS: Powershell DNS Delivery☆217Sep 26, 2018Updated 7 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- 4.55 kernel dumping POC with patches☆15Mar 20, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆370Nov 19, 2024Updated last year
- ☆58Jul 16, 2017Updated 8 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- ☆16Jan 15, 2018Updated 8 years ago
- ☆40Jan 14, 2018Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆310Oct 27, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆184Jun 10, 2022Updated 3 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- Collection of PowerShell scripts☆452Dec 18, 2017Updated 8 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆306Jan 12, 2023Updated 3 years ago
- linux rootkit☆161Feb 12, 2018Updated 8 years ago
- Embed and hide any file in an HTML file☆491Sep 27, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆162Jul 27, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago