SixGenInc / Noctilucent
Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
☆677Updated last year
Alternatives and similar repositories for Noctilucent:
Users that are interested in Noctilucent are comparing it to the libraries listed below
- A list of Domain Frontable Domains by CDN☆568Updated 3 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆762Updated last year
- A pluggable transport to circumvent Internet censorship☆158Updated last year
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,066Updated 2 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,178Updated 4 years ago
- ☆1,201Updated last year
- A tool to make socks connections through HTTP agents☆691Updated 3 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆406Updated 5 years ago
- Data exfiltration over DNS request covert channel☆856Updated 9 months ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆460Updated last year
- Easy files and payloads delivery over DNS☆420Updated 10 months ago
- Automatic Discrepancy Discovery for DPI Elusion☆255Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 8 months ago
- Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysi…☆879Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,570Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,108Updated last year
- GTRS - Google Translator Reverse Shell☆616Updated 4 months ago
- PowerShell ReverseTCP Shell - Framework☆1,053Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,208Updated 4 years ago
- Evade sysmon and windows event logging☆614Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆675Updated 4 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆351Updated last year
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,105Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Updated 2 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆489Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,073Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆638Updated 5 years ago