SixGenInc / NoctilucentLinks
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
☆688Updated 2 years ago
Alternatives and similar repositories for Noctilucent
Users that are interested in Noctilucent are comparing it to the libraries listed below
Sorting:
- 🕳 godoh - A DNS-over-HTTPS C2☆800Updated 2 years ago
- A list of Domain Frontable Domains by CDN☆569Updated 3 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,081Updated 3 years ago
- Data exfiltration over DNS request covert channel☆877Updated last year
- A pluggable transport to circumvent Internet censorship☆161Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆625Updated 3 months ago
- A tool to make socks connections through HTTP agents☆717Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 6 years ago
- Multiplatform reverse shell generator☆592Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Updated 4 years ago
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,143Updated 8 months ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 6 years ago
- Easy files and payloads delivery over DNS☆425Updated last year
- Scanner for CVE-2020-0796 - SMBv3 RCE☆708Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆607Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated 2 months ago
- Evade sysmon and windows event logging☆627Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 5 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆372Updated 2 years ago
- Automatic Discrepancy Discovery for DPI Elusion☆256Updated 5 years ago
- ☆1,278Updated 2 years ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆209Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,257Updated 5 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,271Updated 5 years ago
- PowerShell ReverseTCP Shell - Framework☆1,062Updated 3 years ago