audibleblink / letsproxyLinks
Quickly fetch Let's Encrypt certs and serve a reverse proxy
☆104Updated 3 years ago
Alternatives and similar repositories for letsproxy
Users that are interested in letsproxy are comparing it to the libraries listed below
Sorting:
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 3 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- An epic web shell☆84Updated last week
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- A simple, extensible C&C beaconing system.☆101Updated 7 years ago
- A Django application to help red team operators manage a library of domain names☆165Updated 2 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- This is a bash script to bypass 802.1x NAC☆98Updated 2 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- unix wildcard attacks☆133Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆167Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago