dunderhay / git-rotateLinks
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
☆145Updated last year
Alternatives and similar repositories for git-rotate
Users that are interested in git-rotate are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆123Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆72Updated 5 months ago
- ☆160Updated last year
- Everything and anything related to password spraying☆144Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- ☆112Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆107Updated last month
- ☆91Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆65Updated 3 weeks ago
- A Red Team Activity Hub☆222Updated 3 weeks ago
- ☆70Updated 5 months ago
- Generate and Manage KeyCredentialLinks☆161Updated 2 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆92Updated 5 months ago
- A community-driven collection of BloodHound queries☆120Updated last week
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- ☆185Updated 9 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆205Updated 4 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- PoC that downloads an executable from a public SSL certificate☆125Updated last month
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆73Updated 2 weeks ago
- Detect common NFS server misconfigurations☆63Updated 3 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆114Updated 7 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- ☆80Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆133Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated 2 months ago