captain-woof / TunnelPy
TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the outside, and any internal host in a network, by pivoting from/to a 'middle-man' host that is accessible by the client from outside.
☆21Updated 4 years ago
Alternatives and similar repositories for TunnelPy:
Users that are interested in TunnelPy are comparing it to the libraries listed below
- ☆32Updated last year
- Python template to assist with buffer overflows☆71Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- Nessus Parser☆55Updated 7 years ago
- ☆27Updated 5 years ago
- Python program to exploit stack-based buffer overflows.☆22Updated 4 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- Post exploitation helper☆38Updated last year
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- OSCP Buffer Overflow in 30 minutes☆35Updated 5 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 4 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- ARCHIVED: Use 'peh' instead☆16Updated 3 years ago
- ☆48Updated 3 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Don't expect much :) Just expect to learn new things!☆61Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- ☆17Updated 3 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- ☆45Updated 6 months ago
- ☆28Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆24Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Template project for Offensive Security Exam Documentation☆10Updated 5 years ago