bohops / pyrevtunLinks
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆26Updated 8 years ago
Alternatives and similar repositories for pyrevtun
Users that are interested in pyrevtun are comparing it to the libraries listed below
Sorting:
- ☆16Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆73Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- ☆50Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated 2 years ago
- Zoho ManageEngine Desktop Central CVEs☆16Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- Malicious DLL Generator in Py3☆26Updated 5 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- module for certexfil☆15Updated 3 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago