synacktiv / IPSpinnerLinks
IPSpinner works as a local proxy that redirects requests through external services.
☆63Updated 3 months ago
Alternatives and similar repositories for IPSpinner
Users that are interested in IPSpinner are comparing it to the libraries listed below
Sorting:
- ☆137Updated last month
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆56Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆138Updated 10 months ago
- A Python POC for CRED1 over SOCKS5☆149Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆90Updated 2 weeks ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 7 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- A community-driven collection of BloodHound queries☆37Updated this week
- C++ Reflective Assembly Loader☆27Updated 3 months ago
- ☆50Updated 7 months ago
- ☆70Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆86Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- Adversary Emulation Framework☆114Updated 11 months ago
- Automating the MITM attack on WSUS☆18Updated last week
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- ☆90Updated 4 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago