areyou1or0 / TunnelingView external linksLinks
I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou
☆32Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for Tunneling
Users that are interested in Tunneling are comparing it to the libraries listed below
Sorting:
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆123Apr 17, 2020Updated 5 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- A curated list of awesome OSCP resources☆18Apr 15, 2020Updated 5 years ago
- Website vuln example.☆11Sep 26, 2025Updated 4 months ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆15May 17, 2018Updated 7 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- International Space Station locator made using wheretheiss.at's API and Express.js☆16Dec 20, 2022Updated 3 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated last year
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- About Us☆19Mar 30, 2024Updated last year
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Okay DaVinci is an AI personal assistant fueled by Elevenlabs and ChatGPT☆29Sep 24, 2024Updated last year
- A simple bastion host setup designed for cloud-hosted lab environments.☆30Dec 4, 2020Updated 5 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- ☆67May 22, 2023Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Update Synology DSM Auto Block list from file or url☆40Oct 26, 2023Updated 2 years ago
- ☆10Oct 9, 2024Updated last year
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Descripción del perfil☆11May 27, 2024Updated last year
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Mar 4, 2021Updated 4 years ago
- ☆85Feb 23, 2020Updated 5 years ago
- Python template to assist with buffer overflows☆72Nov 12, 2019Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- ☆13Jan 17, 2025Updated last year
- Práctica 2 del Taller de Git y GitHub de 42 Málaga☆12Oct 10, 2024Updated last year
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- 一个网络工具集。具有内网穿透(INTRANET PENETRATION)、反向代理(REVERSE PROXY)、HTTP代理(HTTP PROXY)等功能。☆11Oct 25, 2023Updated 2 years ago