jataware / vpnrotateView external linksLinks
VPN proxy server for nordvpn, personal internet access, windscribe
☆19May 26, 2023Updated 2 years ago
Alternatives and similar repositories for vpnrotate
Users that are interested in vpnrotate are comparing it to the libraries listed below
Sorting:
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week
- Automatially unzip files added to a specified directory☆13Mar 12, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ☆45Nov 5, 2018Updated 7 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- .Net Core library for cryptocurrency trading with support for many exchanges on the Bitcoin and Ethereum blockchains☆11Aug 27, 2025Updated 5 months ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated last month
- Volumetric Development☆11Mar 19, 2024Updated last year
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆11Jul 11, 2023Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆10Jun 26, 2024Updated last year
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 3 months ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Aug 13, 2019Updated 6 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 2 months ago
- TeamsSix 的个人博客☆10Sep 6, 2025Updated 5 months ago
- KCP bindings for Rust☆10Feb 1, 2022Updated 4 years ago
- go版本机器学习框架☆10May 8, 2025Updated 9 months ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆42Jun 26, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago