bohops / pyrevtun
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆26Updated 7 years ago
Alternatives and similar repositories for pyrevtun:
Users that are interested in pyrevtun are comparing it to the libraries listed below
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Updated 6 years ago
- Malicious DLL Generator in Py3☆26Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Zoho ManageEngine Desktop Central CVEs☆16Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- ☆31Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆11Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Playing around with token manipulation in C#.☆28Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- ☆50Updated 4 years ago
- NTLMRelay for MS Exchange☆11Updated 6 years ago