Geeoon / DNS-Tunnel-Keylogger
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
☆218Updated 3 months ago
Related projects: ⓘ
- ☆474Updated 5 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆109Updated this week
- Light-weight web security scanner☆148Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆339Updated 5 months ago
- OSINT tool to crawl a site and extract useful recon info.☆174Updated 2 months ago
- Tool for hiding Kali Linux on the network☆295Updated 3 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆72Updated 3 weeks ago
- NTP Exfiltration Tool☆132Updated 10 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆207Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated last week
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆106Updated 2 months ago
- A monster cheatsheet on MITM attacks☆311Updated 7 months ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆405Updated last year
- PacketSpy☆130Updated 3 months ago
- WiFi Penetration Testing & Auditing Tool☆374Updated 2 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆301Updated 5 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆92Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆149Updated 3 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆468Updated last month
- ☆181Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆84Updated 8 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆259Updated last year
- Search & Parse Password Leaks☆280Updated 6 months ago
- Youtube as C2 - Control Windows systems uploading videos to Youtube☆70Updated 2 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆109Updated 8 months ago
- ☆88Updated 9 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆128Updated 4 months ago
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- The Telegram Snowball Sampling Tool is a Python-based utility designed for conducting snowball sampling to collect Telegram channels thro…☆89Updated 7 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆148Updated 7 months ago