praetorian-inc / google-redirectorLinks
A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.
☆122Updated last month
Alternatives and similar repositories for google-redirector
Users that are interested in google-redirector are comparing it to the libraries listed below
Sorting:
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆133Updated 5 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 10 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- ☆136Updated 10 months ago
- ☆57Updated 10 months ago
- Sniffing files generator☆59Updated 9 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Updated 9 months ago
- Internal Monologue BOF☆78Updated 11 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 11 months ago
- ☆114Updated last year
- A small How-To on creating your own weaponized WSL file☆118Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 10 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- ☆109Updated 10 months ago
- Permanently disable EDRs as local admin☆122Updated 2 months ago
- adws enumeration bof☆160Updated 2 months ago
- Python tool to interact with WMI StdRegProv☆59Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆76Updated this week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Lateral Movement via the .NET Profiler☆84Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- TokenCert☆102Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 2 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆135Updated 3 weeks ago
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆151Updated last month
- A hoontr must hoont☆102Updated 3 weeks ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆105Updated 7 months ago