SixGenInc / NoctilucentLinks
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
β686Updated 2 years ago
Alternatives and similar repositories for Noctilucent
Users that are interested in Noctilucent are comparing it to the libraries listed below
Sorting:
- π³ godoh - A DNS-over-HTTPS C2β791Updated last year
- A list of Domain Frontable Domains by CDNβ569Updated 3 years ago
- Data exfiltration over DNS request covert channelβ871Updated last year
- A tool for IDN homograph attacks and detection.β739Updated 4 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.β1,073Updated 3 years ago
- GTRS - Google Translator Reverse Shellβ620Updated 2 weeks ago
- DNS covert channel implant for Red Teams.β732Updated 5 years ago
- A pluggable transport to circumvent Internet censorshipβ160Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.β412Updated 5 years ago
- Easy files and payloads delivery over DNSβ422Updated last year
- A tool to make socks connections through HTTP agentsβ716Updated 4 years ago
- β1,263Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.β1,139Updated 5 months ago
- β374Updated last month
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Ruleβ208Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.β381Updated 4 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.β413Updated 4 years ago
- A Golang implant that uses Slack as a command and control serverβ461Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existingβ¦β1,657Updated 2 weeks ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .β647Updated 5 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.β609Updated 3 years ago
- Automatic Discrepancy Discovery for DPI Elusionβ257Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,153Updated 4 years ago
- Multiplatform reverse shell generatorβ591Updated 5 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCEβ695Updated 5 years ago
- Phantom Tap (PhanTap) - an βinvisibleβ network tap aimed at red teamsβ607Updated last year
- About PumpSwap Volume Bot, Raydium Volume Bot (clmm, cpmm, launchpad), Meteora Volume Bot (DLMM , Dynamic amm), PumpSwap Volume Bot. no aβ¦β489Updated 2 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Goβ1,240Updated 5 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sysβ¦β490Updated 5 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")β372Updated 2 years ago