bohops / pyrevtunLinks
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆26Updated 8 years ago
Alternatives and similar repositories for pyrevtun
Users that are interested in pyrevtun are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated 5 months ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆34Updated 5 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- ☆50Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated last month
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆74Updated 11 months ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 4 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- Malicious DLL Generator in Py3☆26Updated 5 years ago
- ☆20Updated 5 years ago
- ReVBShell - Reverse VBS Shell☆82Updated last month
- NTLMRelay for MS Exchange☆11Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Updated 4 years ago
- c# reverse shell poc☆27Updated 7 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆16Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Exfiltrate data from a compromised target using covert channels☆17Updated 4 years ago
- ☆11Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Updated last year