dunderhay / git-rotateLinks
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆146Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Everything and anything related to password spraying☆146Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 10 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆80Updated 6 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆91Updated 2 months ago
- ☆160Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆123Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆93Updated last month
- Detect common NFS server misconfigurations☆67Updated 4 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆245Updated last year
- ☆91Updated 8 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- ☆113Updated 4 months ago
- A community-driven collection of BloodHound queries☆147Updated this week
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆249Updated last month
- Generate and Manage KeyCredentialLinks☆165Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆134Updated 8 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆81Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- A Red Team Activity Hub☆222Updated last week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 4 months ago