SECFORCE / Tunna
Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
☆1,254Updated 2 years ago
Alternatives and similar repositories for Tunna:
Users that are interested in Tunna are comparing it to the libraries listed below
- Simple reverse ICMP shell☆1,584Updated 7 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆736Updated 8 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,077Updated 2 months ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- A collection of pentest and development tips☆1,109Updated 2 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,068Updated 3 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,865Updated 4 years ago
- Linux Exploit Suggester; based on operating system release number☆1,787Updated 10 years ago
- A tool to abuse Exchange services☆2,223Updated 11 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,422Updated 2 years ago
- Tool for extracting information from newly spawned processes☆753Updated 3 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,126Updated 4 years ago
- Proof of concept for CVE-2019-0708☆1,184Updated 3 years ago
- Socks proxy, and reverse socks server using powershell.☆788Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆468Updated 8 years ago
- Create a TCP circuit through validly formed HTTP requests☆345Updated 8 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,074Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,533Updated 3 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,006Updated 6 years ago
- Multiplatform reverse shell generator☆587Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,502Updated last year
- A little toolbox to play with Microsoft Kerberos in C☆1,467Updated 3 years ago
- ☆723Updated 4 years ago
- dump☆493Updated 5 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆810Updated 7 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆780Updated last year
- Vulnerability Labs for security analysis☆1,170Updated 4 years ago
- MS17-010☆2,187Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆913Updated 4 years ago