synacktiv / IPSpinner
IPSpinner works as a local proxy that redirects requests through external services.
☆39Updated last week
Alternatives and similar repositories for IPSpinner:
Users that are interested in IPSpinner are comparing it to the libraries listed below
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆28Updated 3 weeks ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Utilities for obfuscating shellcode☆55Updated last week
- CaptainCredz is a modular and discreet password-spraying tool.☆100Updated 3 weeks ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago
- ☆49Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- ☆54Updated last month
- Deploy a phishing infrastructure on the fly.☆68Updated 3 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- ☆37Updated last month
- Artifact monitoring that ensures fairplay☆75Updated last month
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆41Updated last month
- ☆69Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated last month
- ☆65Updated last year
- Your Skyfall Infrastructure Pack☆64Updated 2 weeks ago
- ☆71Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Living off the land searches for explorer and sharepoint☆59Updated 4 months ago
- Monarch - The Adversary Emulation Toolkit☆61Updated 2 months ago
- Living Off the Foreign Land setup scripts☆65Updated last month
- ☆45Updated 2 weeks ago
- Sniffing files generator☆55Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Adversary Emulation Framework☆92Updated 8 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated 11 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆38Updated last month