boringthegod / CloudFadeLinks
Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing
☆24Updated last year
Alternatives and similar repositories for CloudFade
Users that are interested in CloudFade are comparing it to the libraries listed below
Sorting:
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- ☆18Updated last week
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 8 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 6 months ago
- rcat☆73Updated 3 years ago
- ☆160Updated 6 months ago
- Permanently disable EDRs as local admin☆124Updated 3 weeks ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 9 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- A hoontr must hoont☆100Updated last month
- ☆94Updated 11 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆148Updated last month
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- Execute shellcode via ASPNET compiler☆59Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 5 months ago
- Stage 0☆168Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- Adversary Emulation Framework☆128Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆76Updated last month
- The different ways to dump lsass☆203Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Utilities for obfuscating shellcode☆96Updated 3 months ago
- ☆75Updated 9 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆119Updated last year