bohops / pyrevtunLinks
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆26Updated 8 years ago
Alternatives and similar repositories for pyrevtun
Users that are interested in pyrevtun are comparing it to the libraries listed below
Sorting:
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- c# reverse shell poc☆26Updated 3 weeks ago
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- ☆50Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆14Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- ReVBShell - Reverse VBS Shell☆82Updated 2 months ago
- ☆37Updated 5 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- ☆20Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- ☆16Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆75Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- NTLMRelay for MS Exchange☆11Updated 7 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- ☆52Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Updated 2 years ago
- Malicious DLL Generator in Py3☆27Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Router socks. One port socks for all the others.☆69Updated last year