quarkslab / proxyblob
SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.
☆56Updated this week
Alternatives and similar repositories for proxyblob:
Users that are interested in proxyblob are comparing it to the libraries listed below
- ☆54Updated 2 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 2 months ago
- Adversary Emulation Framework☆98Updated 9 months ago
- ☆106Updated 2 months ago
- A python script that automates a C2 Profile build☆40Updated last month
- ForsHops☆114Updated last month
- ☆97Updated 8 months ago
- ☆110Updated 5 months ago
- ☆43Updated 3 weeks ago
- Enumerate Domain Users Without Authentication☆33Updated 2 weeks ago
- TokenCert☆95Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- ☆55Updated 6 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆148Updated 7 months ago
- Sniffing files generator☆54Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆143Updated 2 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆65Updated last week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated last week
- a port of privkit bof for havoc☆23Updated last year
- AzureAD beacon object files☆118Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆70Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- ☆109Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆26Updated 3 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆90Updated 6 months ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago