maliciousgroup / IP-Obfuscator
A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls
☆18Updated 5 years ago
Alternatives and similar repositories for IP-Obfuscator
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
Sorting:
- ☆18Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆18Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆20Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆12Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Free Email Providers☆10Updated last year
- ☆11Updated 3 weeks ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 weeks ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- ☆24Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆11Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆17Updated 5 years ago