basic proxy as an azure function serverless app
☆17Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for azure-function-proxy
Users that are interested in azure-function-proxy are comparing it to the libraries listed below
Sorting:
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 3 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated last month
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- ☆105Jul 31, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆149Nov 3, 2021Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆114Oct 21, 2023Updated 2 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- AdHoc solutions☆49Aug 29, 2023Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆125May 24, 2022Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago