ZephrFish / OmniProxView external linksLinks
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
☆268Dec 15, 2025Updated last month
Alternatives and similar repositories for OmniProx
Users that are interested in OmniProx are comparing it to the libraries listed below
Sorting:
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- Your Skyfall Infrastructure Pack☆90Jan 25, 2026Updated 2 weeks ago
- BOF to steal browser cookies & credentials☆496Jan 22, 2026Updated 3 weeks ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- Powershell and python utilties for Entra Connect☆27Jun 5, 2025Updated 8 months ago
- ☆65Mar 15, 2024Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆307Mar 31, 2025Updated 10 months ago
- ☆25Feb 9, 2022Updated 4 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 9 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ☆28Dec 28, 2017Updated 8 years ago
- Lateral Movement Bof with MSI ODBC Driver Install☆144Sep 30, 2025Updated 4 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆184Sep 19, 2025Updated 4 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆75Oct 27, 2025Updated 3 months ago
- AADInternals-Endpoints PowerShell module☆33Jul 2, 2025Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Collection of BOFs for Cobalt Strike☆33Mar 28, 2023Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Feb 21, 2025Updated 11 months ago
- Remote command line LSASS extractor☆33Aug 25, 2025Updated 5 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,030Dec 31, 2025Updated last month
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- ☆193Dec 17, 2025Updated last month
- ☆21Jan 8, 2026Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 9 months ago
- ☆17Jan 9, 2025Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- ☆122Oct 9, 2023Updated 2 years ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated 3 weeks ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago