ZephrFish / OmniProxLinks
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
☆256Updated last month
Alternatives and similar repositories for OmniProx
Users that are interested in OmniProx are comparing it to the libraries listed below
Sorting:
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- Group Policy Objects manipulation and exploitation framework☆284Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆160Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆138Updated 5 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Updated this week
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆154Updated last week
- Generate and Manage KeyCredentialLinks☆180Updated 3 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆85Updated 4 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 4 months ago
- ☆55Updated 2 months ago
- pysnaffler☆109Updated last week
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- Utilities for obfuscating shellcode☆97Updated 4 months ago
- Addon for BHCE☆58Updated 9 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆180Updated 3 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆68Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆93Updated 2 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆277Updated last week
- ☆157Updated 8 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆267Updated this week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆76Updated last month
- ☆57Updated 7 months ago
- LinkedIn recon the easy way☆110Updated 6 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago