tothi / azure-function-proxy
basic proxy as an azure function serverless app
☆18Updated 2 years ago
Alternatives and similar repositories for azure-function-proxy
Users that are interested in azure-function-proxy are comparing it to the libraries listed below
Sorting:
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- ☆17Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- RDP Checker☆63Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated last month
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆18Updated last year
- A technique for Active Directory domain persistence☆39Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆26Updated 9 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- ☆19Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago