captain-woof / TunnelPyLinks
TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the outside, and any internal host in a network, by pivoting from/to a 'middle-man' host that is accessible by the client from outside.
☆21Updated 4 years ago
Alternatives and similar repositories for TunnelPy
Users that are interested in TunnelPy are comparing it to the libraries listed below
Sorting:
- ☆32Updated last year
- ☆27Updated 5 years ago
- Nessus Parser☆56Updated 7 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- Post exploitation helper☆38Updated 2 years ago
- ☆48Updated 3 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- Python program to exploit stack-based buffer overflows.☆22Updated 4 years ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- OSCP Buffer Overflow in 30 minutes☆36Updated 5 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- ☆18Updated 3 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- ARCHIVED: Use 'peh' instead☆16Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 3 years ago
- ☆79Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆10Updated 5 years ago
- ☆18Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 4 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆43Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆118Updated 4 years ago
- ☆28Updated 4 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago