audibleblink / letsproxy
Quickly fetch Let's Encrypt certs and serve a reverse proxy
☆100Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for letsproxy
- Cross-Platform Reverse Socks Proxy in Go☆25Updated last year
- Burp Commander written in Go☆57Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆30Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆63Updated 2 years ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆84Updated last month
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 4 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆175Updated 2 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆66Updated 2 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated this week
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆99Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Automated 802.1x Bypass☆84Updated 4 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- A simple, extensible C&C beaconing system.☆97Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆81Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago