vysecurity / DomainFrontingListsLinks
A list of Domain Frontable Domains by CDN
☆568Updated 3 years ago
Alternatives and similar repositories for DomainFrontingLists
Users that are interested in DomainFrontingLists are comparing it to the libraries listed below
Sorting:
- Easy files and payloads delivery over DNS☆422Updated last year
- Search for potential frontable domains☆632Updated 2 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆416Updated last year
- Search for categorized domain☆445Updated 6 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆783Updated last year
- ☆306Updated 6 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429Updated 3 years ago
- A WebSocket C2 Tool☆401Updated 7 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆308Updated 2 years ago
- Socks proxy, and reverse socks server using powershell.☆793Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,009Updated 7 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆675Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,029Updated 5 years ago
- ☆272Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆463Updated 2 years ago
- Tool for extracting information from newly spawned processes☆761Updated 2 months ago
- ☆525Updated 2 years ago
- socks4 reverse proxy for penetration testing☆602Updated 7 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- ☆397Updated 4 years ago
- ☆298Updated 4 years ago
- ☆392Updated last month
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆451Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆318Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Aggressor scripts I've made for Cobalt Strike☆409Updated 2 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Updated last year