Run programs in a network namespace where all traffic go through proxy
☆76Apr 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for proxy-ns
Users that are interested in proxy-ns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆44Jul 29, 2025Updated 9 months ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆46Dec 9, 2021Updated 4 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tailscale-based Windows VNC persistence tool with Session 0 isolation bypass, embedding a full WireGuard peer and RFB server into a singl…☆276Apr 11, 2026Updated 3 weeks ago
- Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)☆14Oct 21, 2024Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 9 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- Collection of scripts and CMake files to easily link to LLVM into your project (Windows, Linux, macOS).☆43Apr 2, 2025Updated last year
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆56Dec 30, 2025Updated 4 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java JDK 8-18 CodeQL databases☆17Jun 2, 2024Updated last year
- ☆13Dec 7, 2023Updated 2 years ago
- CVE-2024-43044的利用方式☆20Aug 13, 2024Updated last year
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 5 months ago
- 在线安软识别☆12Aug 6, 2025Updated 9 months ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Apr 28, 2026Updated last week
- Simple command-line URL parser☆25Updated this week
- User-Defined C2 BOF Template☆32Nov 24, 2025Updated 5 months ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Jan 22, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- ☆26Dec 13, 2024Updated last year
- IDA Terminal☆18Feb 27, 2026Updated 2 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- ☆13Dec 4, 2020Updated 5 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…