Synacktiv-contrib / rdp2tcpLinks
rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports forwarding over an already established rdesktop session.
☆41Updated 7 years ago
Alternatives and similar repositories for rdp2tcp
Users that are interested in rdp2tcp are comparing it to the libraries listed below
Sorting:
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆40Updated 8 years ago
- Shellcode Of Death☆38Updated 11 years ago
- shell over icmp☆31Updated 12 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- ☆22Updated 8 years ago
- ☆81Updated 11 years ago
- ☆54Updated 7 years ago
- ☆33Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- CVE-2017-9791☆27Updated 7 years ago
- Metasploit Framework☆31Updated 5 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 System☆31Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- Introduce you to shellcode development.☆23Updated 8 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆81Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Support x86 and x64☆66Updated 4 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆61Updated 3 months ago
- ☆43Updated 5 years ago