D4rkwat3r / aiohttp-ip-rotatorView external linksLinks
Asynchronous alternative to the requests-ip-rotator library
☆45Jan 10, 2025Updated last year
Alternatives and similar repositories for aiohttp-ip-rotator
Users that are interested in aiohttp-ip-rotator are comparing it to the libraries listed below
Sorting:
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- The "hunter2" password manager is a simple script-oriented password manager.☆16Jun 22, 2019Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- A customized pyvirtualdisplay for use with SeleniumBase automation.☆20Dec 16, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆56Dec 12, 2022Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated last month
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- KlaudSol CMS is a Headless and Serverless CMS (Content Management System). A great alternative to WordPress and Strapi.☆11Dec 3, 2024Updated last year
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- A collection of theoretical research and analysis of cryptography-based game outcomes in the pursuit of a breakthrough discovery.☆17Oct 29, 2024Updated last year
- It's a Locust's metrics exporter for Prometheus☆10Nov 7, 2025Updated 3 months ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- Open source project to help the Web3 community fight frauds and scams.☆18Feb 7, 2024Updated 2 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 3 weeks ago
- ☆37Jun 27, 2020Updated 5 years ago
- LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.☆122Jan 27, 2020Updated 6 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆83Oct 2, 2020Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- An autonomous service implementing a decentralized Impact Evaluator☆13Dec 1, 2025Updated 2 months ago
- ☆37Dec 27, 2021Updated 4 years ago
- Repo to install macOS on Dell Optiplex 755☆12Sep 4, 2020Updated 5 years ago
- A curated list of real Micro SaaS tools categorized by niche. Perfect for inspiration, research, and startup ideas.☆90Feb 9, 2026Updated last week
- Turn your VPS into an attack box☆34Mar 17, 2024Updated last year
- Provides the spine and skeleton framework for the WSU Web in WordPress☆10Feb 16, 2024Updated 2 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Mar 2, 2019Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago