VPN proxy server for nordvpn, personal internet access, windscribe
☆19May 26, 2023Updated 2 years ago
Alternatives and similar repositories for vpnrotate
Users that are interested in vpnrotate are comparing it to the libraries listed below
Sorting:
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- 【Android 11-13】为移动热点设置静态 IP☆10Mar 5, 2024Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 2 years ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated 2 months ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Bash scripts for use on Linux for minting Cardano NFTs☆12Aug 2, 2022Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- go版本机器学习框架☆10May 8, 2025Updated 9 months ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- An demonic library to write PE binaries☆11Feb 12, 2024Updated 2 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Search-Registry: Find Keys, Value Names, and Value Data in the Registry☆11Jul 3, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago