dunderhay / git-rotateLinks
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆146Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- Everything and anything related to password spraying☆145Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 5 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆122Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- ☆161Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆109Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆208Updated 5 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- A Red Team Activity Hub☆220Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 11 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- ☆55Updated last year
- Python utility that generates "imageless" QR codes in various formats☆127Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆180Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆91Updated 8 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆67Updated last week
- Generate and Manage KeyCredentialLinks☆164Updated last month
- ☆83Updated last month
- A community-driven collection of BloodHound queries☆138Updated last week
- ☆186Updated 9 months ago
- ☆112Updated 3 months ago