HTTP Proxy using Amazon Lambda for source IP cycling
☆15Apr 6, 2021Updated 4 years ago
Alternatives and similar repositories for LambProxy
Users that are interested in LambProxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 12 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Automate Amazon CloudWatch Dashboard Deployment by using Tagging☆13Apr 19, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- CloudFormation Custom Resource to build Lambda layers for python scripts based on the requirements.txt☆13Sep 2, 2019Updated 6 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- AWS Quick Start Team☆19Oct 3, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- to demo a flask python app talking to mongodb and using dynamic secrets with vault using the API☆13Mar 27, 2020Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- ☆16Oct 31, 2024Updated last year
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- Tie - Font Conversion of The Finnish Traffic Sign Typeface☆17Nov 26, 2024Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago