Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.
☆31Mar 2, 2026Updated this week
Alternatives and similar repositories for MSFT-IP-Tracker
Users that are interested in MSFT-IP-Tracker are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 10 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- ☆26Feb 11, 2025Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 3 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆543Jun 3, 2025Updated 9 months ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- ☆58Jun 2, 2025Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Easily obfuscate your html!☆100Apr 7, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆41Jul 11, 2024Updated last year
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- MacOS Shared Library to Shellcode Loader☆54Feb 23, 2026Updated last week
- Modified Version of Evilginx ( Telegram Notifications )☆34Feb 25, 2026Updated last week
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago