dunderhay / git-rotateLinks
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆150Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- ☆104Updated 2 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Everything and anything related to password spraying☆151Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆119Updated 7 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- ☆167Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆143Updated 6 months ago
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆94Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Updated 10 months ago
- A Red Team Activity Hub☆235Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆77Updated last year
- A community-driven collection of BloodHound queries☆160Updated 2 weeks ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆120Updated 8 months ago
- Serverless AITM Simulation Framework for Entra ID and M365☆207Updated last month
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆260Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated last year
- ☆190Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year