basic proxy as an azure function serverless app
☆17Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for azure-function-proxy
Users that are interested in azure-function-proxy are comparing it to the libraries listed below
Sorting:
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Open-Source Phishing Toolkit☆19May 23, 2021Updated 4 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 2 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- ☆52Apr 1, 2022Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated last month
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆105Jul 31, 2024Updated last year
- DLL Hijack Search Order Enumeration BOF☆149Nov 3, 2021Updated 4 years ago
- ☆118Jun 2, 2021Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago