darkerego / blitzkloud
Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support
☆22Updated 8 months ago
Alternatives and similar repositories for blitzkloud:
Users that are interested in blitzkloud are comparing it to the libraries listed below
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- ☆16Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Magento Security Scanner☆15Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- ☆17Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆14Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆18Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆11Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- ☆12Updated 4 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 2 weeks ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- ☆16Updated 6 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago