IceM4nn / IP-Obfuscator
Simple script to convert and obscure any IP address of any host.
☆21Updated 7 years ago
Alternatives and similar repositories for IP-Obfuscator:
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆21Updated 11 months ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆25Updated 2 weeks ago
- ☆27Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- Python port of Pipal for password analytics☆22Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Interactive Windows Reverse Shell Server/Client☆43Updated 4 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- ☆19Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Steal Apache Solr instance Queries with or without a username and password.☆12Updated 3 years ago
- ☆15Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Multithread reverse shell listener☆24Updated last year
- Antiscan.me automatization script☆26Updated 10 months ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆49Updated last year
- Wordlist generator☆16Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago