HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on the Internet. When it receives signals from the actual target system, it redirects it to the hacker’s server.
☆259Apr 25, 2021Updated 5 years ago
Alternatives and similar repositories for HTran
Users that are interested in HTran are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用于端口转发的多线程内网渗透工具,改进并整合网络著名开源程序HTran、lcx。☆39May 22, 2021Updated 5 years ago
- Tool for tunnel☆322Mar 9, 2019Updated 7 years ago
- lcx.exe cross-platform version☆12Mar 5, 2016Updated 10 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- Example DLL to load from Windows NetShell☆182Sep 26, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- FLARE Kernel Shellcode Loader☆175May 3, 2019Updated 7 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,664Oct 11, 2018Updated 7 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,527Nov 15, 2023Updated 2 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆609Sep 7, 2018Updated 7 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,272Sep 4, 2022Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,391Jun 17, 2022Updated 3 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Nov 14, 2019Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,016Jul 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,169Mar 6, 2025Updated last year
- Some useful scripts for CobaltStrike☆856Dec 17, 2020Updated 5 years ago
- My LCX, PortMaper. used in Windows,Linux,Android,Mac☆184Feb 24, 2025Updated last year
- tools☆541Apr 9, 2019Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆128Feb 27, 2025Updated last year
- Run PowerShell command without invoking powershell.exe☆1,550Apr 9, 2026Updated last month
- LSASS memory dumper using direct system calls and API unhooking.☆1,585Jan 5, 2021Updated 5 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,446Jul 20, 2024Updated last year
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,324Jan 18, 2021Updated 5 years ago
- A collection of pentest and development tips☆1,128May 26, 2022Updated 3 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Jul 21, 2020Updated 5 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆744Aug 12, 2016Updated 9 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆332Oct 20, 2019Updated 6 years ago
- Use to generate DLL through Visual Studio☆19Jul 24, 2017Updated 8 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆365Mar 4, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Automated DLL Enumerator☆545Dec 21, 2017Updated 8 years ago
- A tool to elevate privilege with Windows Tokens☆1,068Oct 6, 2023Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,303Aug 15, 2024Updated last year
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,754Dec 13, 2023Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,764Dec 9, 2018Updated 7 years ago