SixGenInc / Noctilucent
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
☆677Updated 2 years ago
Alternatives and similar repositories for Noctilucent
Users that are interested in Noctilucent are comparing it to the libraries listed below
Sorting:
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- A list of Domain Frontable Domains by CDN☆568Updated 3 years ago
- A pluggable transport to circumvent Internet censorship☆158Updated 2 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,068Updated 3 years ago
- ☆1,228Updated last year
- Data exfiltration over DNS request covert channel☆867Updated last year
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,118Updated last month
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆680Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆410Updated 5 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,199Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated 2 weeks ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆753Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,612Updated 2 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆226Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,094Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago
- Multiplatform reverse shell generator☆588Updated 5 years ago
- A tool for IDN homograph attacks and detection.☆735Updated 4 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 4 years ago
- gather gather gather☆577Updated 2 months ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- A tool to make socks connections through HTTP agents☆701Updated 4 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Tunnel IP over ICMP.☆454Updated 3 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆490Updated 4 years ago
- Defences against Cobalt Strike☆1,283Updated 2 years ago