dunderhay / git-rotateLinks
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆148Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Everything and anything related to password spraying☆151Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆115Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆164Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆136Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- ☆163Updated last year
- ☆94Updated 11 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- A community-driven collection of BloodHound queries☆158Updated last week
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆256Updated last month
- ☆120Updated 7 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆133Updated 11 months ago
- ☆101Updated last month
- ☆188Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- Generate and Manage KeyCredentialLinks☆180Updated 2 months ago
- Serverless AITM Simulation Framework for Entra ID and M365☆166Updated last week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A Red Team Activity Hub☆237Updated 2 weeks ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆140Updated 11 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆220Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆257Updated 10 months ago
- ☆73Updated 9 months ago
- ☆54Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year