maliciousgroup / IP-ObfuscatorLinks
A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls
☆18Updated 5 years ago
Alternatives and similar repositories for IP-Obfuscator
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
Sorting:
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- ☆18Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆17Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆17Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆12Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ☆16Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- ☆18Updated last year
- Free Email Providers☆10Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago