bohops / pyrevtun
A pure Python reverse tunnel/reverse port forward utility (prototype) to forward TCP protocols over SSL/TLS.
☆25Updated 7 years ago
Alternatives and similar repositories for pyrevtun:
Users that are interested in pyrevtun are comparing it to the libraries listed below
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- ☆16Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆71Updated 5 years ago
- Automatically perform advanced NTLM hash relay attacks☆14Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- ☆31Updated 4 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Utility to inject honey tokens into lsass.☆27Updated 7 years ago
- Playing around with token manipulation in C#.☆28Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago