Coalfire-Research / LambProxyView external linksLinks
HTTP Proxy using Amazon Lambda for source IP cycling
☆15Apr 6, 2021Updated 4 years ago
Alternatives and similar repositories for LambProxy
Users that are interested in LambProxy are comparing it to the libraries listed below
Sorting:
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆35Jul 28, 2020Updated 5 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Extract credentials and other useful info from network captures☆76Nov 3, 2022Updated 3 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆13Oct 31, 2017Updated 8 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- ☆13Oct 29, 2024Updated last year
- ☆11Apr 22, 2022Updated 3 years ago
- ☆12May 20, 2016Updated 9 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 7 months ago