Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆150May 23, 2024Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- ADFS Brute-Force Login Script☆10Mar 19, 2024Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆47May 31, 2023Updated 2 years ago
- Abusing Azure services over C2☆370Jan 20, 2026Updated 3 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A simple POC to expose Mythic as a MCP server☆74Mar 20, 2025Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- ☆221Mar 26, 2024Updated 2 years ago
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Stage 0☆169Dec 18, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year
- ☆52Mar 30, 2026Updated last month
- TokenCert☆102Nov 15, 2024Updated last year
- PoC Exploit for CVE-2023-35803 Unauthenticated Buffer Overflow in Aerohive HiveOS/Extreme Networks IQ Engine☆23Jul 12, 2023Updated 2 years ago
- ☆194Nov 21, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 11 months ago
- Spoofing desktop login applications with WinForms and WPF☆178Feb 19, 2024Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆570Jun 5, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆308Mar 28, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆200Mar 28, 2025Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Jul 23, 2024Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆69Mar 20, 2024Updated 2 years ago