Gilks / hostscan-bypassLinks
Generate OpenConnect CSD files to bypass Cisco AnyConnect hostscan requirements
☆264Updated 5 years ago
Alternatives and similar repositories for hostscan-bypass
Users that are interested in hostscan-bypass are comparing it to the libraries listed below
Sorting:
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆111Updated 7 years ago
- Grab ssh keys from ssh-agent☆222Updated 5 years ago
- Toolbox for HPE iLO4 & iLO5 analysis☆437Updated 2 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆62Updated 4 months ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆236Updated 6 years ago
- ☆75Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆177Updated 7 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Updated 9 months ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆487Updated this week
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated 3 months ago
- IPv6 auto discovery tool☆94Updated 2 months ago
- XFLTReaT tunnelling framework☆328Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆40Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Simple shell script to "clone" X.509 certificates☆111Updated 9 months ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 5 years ago
- Simple TCP proxy. Allows you to intercept/inspect TCP traffic.☆111Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- A tool to Terraform and automate password cracking on AWS.☆85Updated 6 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- ICMP and DNS tunneling via IPv4 and IPv6☆225Updated 9 months ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆99Updated 6 years ago