I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou
☆32Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for Tunneling
Users that are interested in Tunneling are comparing it to the libraries listed below
Sorting:
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆125Apr 17, 2020Updated 5 years ago
- Most common Linux commands and their examples☆56Feb 20, 2019Updated 7 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- OSCP☆576Feb 6, 2022Updated 4 years ago
- A curated list of awesome OSCP resources☆18Apr 15, 2020Updated 5 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- Website vuln example.☆11Sep 26, 2025Updated 5 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- International Space Station locator made using wheretheiss.at's API and Express.js☆16Dec 20, 2022Updated 3 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated last year
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- Python Script for Automated File Uploads and Downloads to Anonfiles, Bayfiles, GoFile, and More☆15Apr 6, 2025Updated 11 months ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- Okay DaVinci is an AI personal assistant fueled by Elevenlabs and ChatGPT☆29Sep 24, 2024Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- ☆68May 22, 2023Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Frida: callback based hooking of Java classes loaded at runtime☆35Jan 6, 2023Updated 3 years ago
- Update Synology DSM Auto Block list from file or url☆40Oct 26, 2023Updated 2 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Descripción del perfil☆11May 27, 2024Updated last year
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Mar 15, 2020Updated 5 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Mar 4, 2021Updated 5 years ago
- ☆85Feb 23, 2020Updated 6 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- 一个网络工具集。具有内网穿透(INTRANET PENETRATION)、反向代理(REVERSE PROXY)、HTTP代理(HTTP PROXY)等功能。☆11Oct 25, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago