Quickly fetch Let's Encrypt certs and serve a reverse proxy
☆105Jan 29, 2022Updated 4 years ago
Alternatives and similar repositories for letsproxy
Users that are interested in letsproxy are comparing it to the libraries listed below
Sorting:
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- ☆110May 14, 2018Updated 7 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Jul 29, 2019Updated 6 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- macOS Offensive Tools☆270Sep 28, 2023Updated 2 years ago