vysecurity / DomainFrontingListsLinks
A list of Domain Frontable Domains by CDN
☆567Updated 3 years ago
Alternatives and similar repositories for DomainFrontingLists
Users that are interested in DomainFrontingLists are comparing it to the libraries listed below
Sorting:
- Easy files and payloads delivery over DNS☆423Updated last year
- Search for potential frontable domains☆631Updated 2 years ago
- Search for categorized domain☆445Updated 6 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆413Updated last year
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 2 years ago
- A WebSocket C2 Tool☆400Updated 7 years ago
- Socks proxy, and reverse socks server using powershell.☆792Updated 4 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆308Updated 2 years ago
- ☆307Updated 6 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆380Updated 5 years ago
- ☆272Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,025Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆380Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,006Updated 7 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429Updated 3 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- ☆296Updated 4 years ago
- Aggressor scripts I've made for Cobalt Strike☆408Updated last year
- socks4 reverse proxy for penetration testing☆598Updated 7 years ago
- ☆523Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- A proof of concept for the RDP Inception Attack☆348Updated 8 years ago
- ☆395Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆525Updated 2 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆673Updated last year
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- locate and attack Lync/Skype for Business☆339Updated 9 months ago
- ntlm relay attack to Exchange Web Services☆333Updated 7 years ago
- ☆391Updated 3 weeks ago