Geeoon / DNS-Tunnel-Keylogger
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
☆273Updated 10 months ago
Alternatives and similar repositories for DNS-Tunnel-Keylogger:
Users that are interested in DNS-Tunnel-Keylogger are comparing it to the libraries listed below
- ☆534Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆375Updated 6 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆192Updated 2 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆136Updated last week
- Linux-based botnet builder designed for creating advanced botnet payloads.☆77Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆102Updated last month
- ☆313Updated 3 weeks ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆274Updated 6 months ago
- A monster cheatsheet on MITM attacks☆347Updated 3 weeks ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆89Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆215Updated 3 weeks ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆510Updated 8 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆363Updated last year
- Kali noise reduction tool☆312Updated 3 weeks ago
- Embed a payload inside a PNG file☆311Updated 6 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆250Updated last week
- PacketSpy☆151Updated 10 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated last week
- Evasive shellcode loader☆358Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- ☆299Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆580Updated 9 months ago
- ☆311Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆168Updated 10 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆273Updated 3 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆179Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆231Updated 6 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆416Updated last year
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆19Updated 2 weeks ago