SixGenInc / NoctilucentLinks
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
☆680Updated 2 years ago
Alternatives and similar repositories for Noctilucent
Users that are interested in Noctilucent are comparing it to the libraries listed below
Sorting:
- A pluggable transport to circumvent Internet censorship☆158Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- A list of Domain Frontable Domains by CDN☆569Updated 3 years ago
- Tunnel IP over ICMP.☆456Updated 3 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,071Updated 3 years ago
- ☆1,238Updated last year
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago
- Data exfiltration over DNS request covert channel☆867Updated last year
- Automatic Discrepancy Discovery for DPI Elusion☆258Updated 5 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,121Updated 2 months ago
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated last year
- A tool to make socks connections through HTTP agents☆707Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,628Updated 2 years ago
- Redirect attack on Shadowsocks stream ciphers☆395Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,212Updated 4 years ago
- A robust tunelling solution written in golang☆269Updated 2 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆374Updated 2 years ago
- Easy files and payloads delivery over DNS☆423Updated last year
- Tool for extracting information from newly spawned processes☆759Updated last month
- Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysi…☆888Updated 5 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆824Updated 4 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆455Updated 3 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆753Updated last year
- Search for potential frontable domains☆628Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago