IPSpinner works as a local proxy that redirects requests through external services.
☆112Mar 19, 2025Updated 11 months ago
Alternatives and similar repositories for IPSpinner
Users that are interested in IPSpinner are comparing it to the libraries listed below
Sorting:
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- ☆40Oct 8, 2024Updated last year
- Lateral movement with DCOM DLL hijacking☆177Jul 4, 2025Updated 7 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆172May 13, 2024Updated last year
- Automating the MITM attack on WSUS☆308Feb 24, 2026Updated last week
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- ☆64May 31, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆436Jun 27, 2025Updated 8 months ago
- ☆105Feb 11, 2026Updated 2 weeks ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last week
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆96Feb 19, 2026Updated last week
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Continuous password spraying tool☆201Dec 4, 2025Updated 2 months ago
- ☆150Feb 7, 2026Updated 3 weeks ago
- ☆109Feb 17, 2025Updated last year
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- ☆126Jun 28, 2023Updated 2 years ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- ☆29May 10, 2024Updated last year
- ☆43Jan 2, 2023Updated 3 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆122Dec 23, 2025Updated 2 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆164Jan 23, 2026Updated last month
- POC tool to convert CobaltStrike BOF files to raw shellcode☆220Nov 5, 2021Updated 4 years ago
- Collect Windows telemetry for Maldev☆460Jan 30, 2026Updated last month
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A COFF Loader written in Rust☆138Dec 1, 2025Updated 3 months ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 3 months ago