d4rckh / http-redirectorLinks
lightweight http redirector written in nim
☆11Updated 2 years ago
Alternatives and similar repositories for http-redirector
Users that are interested in http-redirector are comparing it to the libraries listed below
Sorting:
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ☆12Updated 2 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆10Updated 6 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- ☆25Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 10 months ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- wsnet☆25Updated 3 weeks ago
- Red Team Infrastructure: Covenant C2☆10Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- An exotic service bruteforce tool.☆13Updated last month
- Extension functionality for the NightHawk operator client☆27Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 8 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year