Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆148May 23, 2024Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- ☆216Mar 26, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Python utility that generates "imageless" QR codes in various formats☆137Aug 10, 2024Updated last year
- ☆190Nov 21, 2024Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- ☆307Mar 15, 2025Updated 11 months ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆607Dec 9, 2025Updated 2 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆67Mar 20, 2024Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- ☆53Sep 23, 2025Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago