Yeeb1 / SockTailLinks
Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s embedded client (tsnet). Zero config, no daemon, no persistence - just a fast way in.
☆138Updated last week
Alternatives and similar repositories for SockTail
Users that are interested in SockTail are comparing it to the libraries listed below
Sorting:
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆221Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆67Updated 3 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆165Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 10 months ago
- A cross platform library to write offensive and defensive security tools in Go☆105Updated last week
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 6 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 2 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆243Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 4 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆168Updated 4 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆190Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Adversary Emulation Framework☆119Updated last week
- ☆140Updated 2 months ago
- ☆163Updated 2 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆132Updated 8 months ago
- Automating the MITM attack on WSUS☆226Updated 2 weeks ago
- Speedy probe-based UDP service scanner☆89Updated 3 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 7 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆261Updated 8 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆228Updated 6 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆167Updated 2 weeks ago
- ☆201Updated last month
- Reaping treasures from strings in remote processes memory☆264Updated 5 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆152Updated 2 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆156Updated 6 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 5 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆140Updated 2 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆189Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year