SixGenInc / Noctilucent
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
β677Updated last year
Alternatives and similar repositories for Noctilucent:
Users that are interested in Noctilucent are comparing it to the libraries listed below
- π³ godoh - A DNS-over-HTTPS C2β761Updated last year
- A list of Domain Frontable Domains by CDNβ568Updated 2 years ago
- A pluggable transport to circumvent Internet censorshipβ157Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.β1,063Updated 2 years ago
- Data exfiltration over DNS request covert channelβ855Updated 8 months ago
- A tool to make socks connections through HTTP agentsβ684Updated 3 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCEβ668Updated 4 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Goβ1,170Updated 4 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.β1,102Updated last year
- Phantom Tap (PhanTap) - an βinvisibleβ network tap aimed at red teamsβ591Updated 7 months ago
- Flamingo captures credentials sprayed across the network by various IT and security products.β451Updated 3 weeks ago
- Tunnel IP over ICMP.β452Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.β369Updated 3 years ago
- Tunnel TCP connections through ICMP.β432Updated last month
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.β404Updated 5 years ago
- Multiplatform reverse shell generatorβ582Updated 4 years ago
- DNS covert channel implant for Red Teams.β734Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existingβ¦β1,552Updated last year
- Windows 10 UAC bypass for all executable files which are autoelevate true .β638Updated 5 years ago
- A tool for IDN homograph attacks and detection.β730Updated 3 years ago
- β1,193Updated last year
- PoC for Zerologon - all research credits go to Tom Tervoort of Securaβ1,204Updated 4 years ago
- Automatic Discrepancy Discovery for DPI Elusionβ254Updated 4 years ago
- Hide your payload in DNSβ606Updated last year
- Easy files and payloads delivery over DNSβ420Updated 9 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,067Updated 3 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")β361Updated last year
- Tool for extracting information from newly spawned processesβ745Updated 2 years ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. Tβ¦β940Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.β412Updated 4 years ago