A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
☆518Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for TREVORproxy
Users that are interested in TREVORproxy are comparing it to the libraries listed below
Sorting:
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,305Jan 29, 2026Updated last month
- ☆568Mar 28, 2024Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,019Feb 1, 2026Updated last month
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- a tool to help operate in EDRs' blind spots☆766Dec 2, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,056Oct 14, 2025Updated 4 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- ☆186Jun 14, 2025Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Nov 2, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated 2 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Feb 27, 2026Updated last week
- LDAP library for auditing MS AD☆486Feb 11, 2026Updated 3 weeks ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆744Jul 29, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- .net config loader☆348Nov 9, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 8 months ago
- ☆190Nov 21, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆609Dec 9, 2025Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago