Establishes mutually trusted TLS connections based on a pre-shared connection key.
☆51Mar 21, 2024Updated last year
Alternatives and similar repositories for kbtls
Users that are interested in kbtls are comparing it to the libraries listed below
Sorting:
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Mar 17, 2025Updated 11 months ago
- ☆18Feb 14, 2019Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- ☆27May 6, 2024Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- ☆57Jan 28, 2024Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ☆23Sep 20, 2024Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆108Nov 7, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Silver SAML forgery tool☆56Feb 26, 2024Updated 2 years ago
- ☆16Jul 17, 2024Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆106Jun 27, 2024Updated last year
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year