SixGenInc / NoctilucentLinks
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
β688Updated 2 years ago
Alternatives and similar repositories for Noctilucent
Users that are interested in Noctilucent are comparing it to the libraries listed below
Sorting:
- π³ godoh - A DNS-over-HTTPS C2β807Updated 2 years ago
- A list of Domain Frontable Domains by CDNβ570Updated 4 years ago
- A tool for IDN homograph attacks and detection.β741Updated 4 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.β1,082Updated 3 years ago
- Data exfiltration over DNS request covert channelβ881Updated last year
- A pluggable transport to circumvent Internet censorshipβ161Updated 2 years ago
- GTRS - Google Translator Reverse Shellβ625Updated 4 months ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Ruleβ209Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.β413Updated 6 years ago
- A tool to make socks connections through HTTP agentsβ718Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCEβ710Updated 5 years ago
- β1,278Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .β647Updated 6 years ago
- DNS covert channel implant for Red Teams.β732Updated 6 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.β380Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.β607Updated 3 years ago
- Easy files and payloads delivery over DNSβ424Updated 3 weeks ago
- Automatic Discrepancy Discovery for DPI Elusionβ257Updated 5 years ago
- Phantom Tap (PhanTap) - an βinvisibleβ network tap aimed at red teamsβ616Updated 3 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.β413Updated 5 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")β373Updated 2 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.β833Updated 4 years ago
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsingβ648Updated last year
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Seβ¦β280Updated 4 years ago
- Hershell is a simple TCP reverse shell written in Go.β531Updated 6 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit π¨π»βπ»β224Updated 4 years ago
- Evade sysmon and windows event loggingβ624Updated 5 years ago
- A Golang implant that uses Slack as a command and control serverβ462Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprintsβ¦β545Updated 8 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.β1,147Updated 9 months ago