AmyangXYZ / GhostTunnel-GoView external linksLinks
Golang version of Ghost Tunnel, or called WiFi Covert Channel
☆27Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for GhostTunnel-Go
Users that are interested in GhostTunnel-Go are comparing it to the libraries listed below
Sorting:
- DNSQuery Sniffer in Golang☆10Nov 19, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- linux 核心模組, 使用 netfilter IPv4 hook 監聽和分析 DNS 請求和回應封包.☆14Oct 25, 2018Updated 7 years ago
- 一个简易的ssh密码防暴力破解程序☆27Feb 21, 2017Updated 8 years ago
- The GA-IDS is a full-fledged host based intrusion detection system developed using the Java programming language to help detect packets h…☆12Feb 27, 2019Updated 6 years ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆19Mar 23, 2014Updated 11 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Nov 15, 2017Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last week
- ☆17Sep 14, 2017Updated 8 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Unix Based Command☆18Jan 13, 2026Updated last month
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- a pass-the-hash tool☆104Mar 1, 2018Updated 7 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Sep 25, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Automatic reversed shell detecting and defensing☆52Oct 25, 2018Updated 7 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- golang的扫描框架, 支持协程池和自动调节协程个数.☆49Feb 8, 2017Updated 9 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 6 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆52Aug 24, 2019Updated 6 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Feb 26, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago
- Python3 Metasploit automation library☆23Dec 8, 2022Updated 3 years ago