GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.
☆335Mar 6, 2019Updated 7 years ago
Alternatives and similar repositories for GhostTunnel
Users that are interested in GhostTunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- PegasusTeam is a group that focuses on WLAN security and Wi-Fi Pentesting.☆72Dec 12, 2018Updated 7 years ago
- Golang version of Ghost Tunnel, or called WiFi Covert Channel☆27Jun 4, 2019Updated 6 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- ☆164May 18, 2018Updated 7 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 11 months ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- CVE-2018-8120 Windows LPE exploit☆501May 30, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Some useful scripts for CobaltStrike☆858Dec 17, 2020Updated 5 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆531Oct 11, 2020Updated 5 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated 2 weeks ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Bash post exploitation toolkit☆747Mar 8, 2026Updated 2 weeks ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 8 years ago