bohops / pyrevtunLinks
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆26Updated 8 years ago
Alternatives and similar repositories for pyrevtun
Users that are interested in pyrevtun are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 6 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- ☆16Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- ☆31Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Updated 5 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- ReVBShell - Reverse VBS Shell☆82Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Basic Dart reverse shell code☆21Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Linux startup analyzer☆65Updated 2 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 7 months ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- ☆50Updated 5 years ago
- c# reverse shell poc☆27Updated 6 years ago
- ☆20Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last month
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Updated 2 years ago
- ☆10Updated 7 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 3 years ago