A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
☆520Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for TREVORproxy
Users that are interested in TREVORproxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,309Jan 29, 2026Updated last month
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,024Feb 1, 2026Updated last month
- ☆569Mar 28, 2024Updated last year
- One proxy to rule them all☆125Jul 28, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,260Mar 19, 2025Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,061Oct 14, 2025Updated 5 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,209Jan 5, 2026Updated 2 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- ☆189Nov 21, 2024Updated last year
- LDAP library for auditing MS AD☆489Feb 11, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- ☆187Jun 14, 2025Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆341Sep 4, 2024Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,309Mar 17, 2026Updated last week
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆745Jul 29, 2025Updated 7 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆449Nov 2, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- ☆832Sep 9, 2022Updated 3 years ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆541May 9, 2025Updated 10 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week