Drewsif / PySecretSOCKSLinks
A python socks server for tunneling a connection over another channel
☆63Updated 8 years ago
Alternatives and similar repositories for PySecretSOCKS
Users that are interested in PySecretSOCKS are comparing it to the libraries listed below
Sorting:
- A toy socks 5 server written in Python☆175Updated last year
- Only Hitting PoC [Tested on Windows Server 2008 r2]☆127Updated 6 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 9 years ago
- Multi-Purpose DNS Server☆144Updated 4 months ago
- port of mimipenguin.sh in python with some additional protection features☆213Updated 8 years ago
- CVE-2018-10933 very simple POC☆126Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 11 months ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- Generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing☆14Updated 11 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- TCP tunnel over RTP/SIP☆96Updated 5 years ago
- ☆63Updated 7 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- GitHub Mirror of Hash-Identifier☆32Updated 13 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago
- HP printer security research code☆91Updated 7 years ago
- Mimipenguin密码抓取神器☆26Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- This script forwards a number of configured local ports to local or remote socket servers.☆114Updated last year
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- ☆20Updated last year
- Heartbleed (CVE-2014-0160) client exploit☆323Updated 9 years ago