SixGenInc / Noctilucent
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
☆678Updated last year
Alternatives and similar repositories for Noctilucent:
Users that are interested in Noctilucent are comparing it to the libraries listed below
- 🕳 godoh - A DNS-over-HTTPS C2☆772Updated last year
- A list of Domain Frontable Domains by CDN☆568Updated 3 years ago
- A pluggable transport to circumvent Internet censorship☆158Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,066Updated 2 years ago
- Automatic Discrepancy Discovery for DPI Elusion☆254Updated 5 years ago
- ☆1,210Updated last year
- A tool to make socks connections through HTTP agents☆691Updated 3 years ago
- Data exfiltration over DNS request covert channel☆860Updated 11 months ago
- DNS covert channel implant for Red Teams.☆731Updated 5 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,181Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 5 months ago
- Multiplatform reverse shell generator☆585Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆598Updated 9 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,112Updated last year
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆225Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago
- Easy per application transparent proxy built on cgroup.☆418Updated 3 months ago
- Tunnel IP over ICMP.☆453Updated 3 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆408Updated 5 years ago
- Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysi…☆882Updated 5 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- A probe resistant proxy☆109Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,586Updated 2 years ago
- Evade sysmon and windows event logging☆619Updated 4 years ago
- Quickly Search Large DNS Datasets☆582Updated 4 years ago
- ☆687Updated 4 months ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,116Updated 2 years ago
- A fast and secure multi protocol honeypot.☆316Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago