doxx / blindLinks
TCP over DNS tunnel b[l]ind written in go.
☆16Updated 11 months ago
Alternatives and similar repositories for blind
Users that are interested in blind are comparing it to the libraries listed below
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Updated last year
- Mythic C2 Profile that allows agents to communicate over GitHub☆15Updated 10 months ago
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆34Updated 2 weeks ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated last year
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆44Updated last week
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- Advanced VPN, Parallel Internet, and De-Location Platform☆94Updated last month
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Updated 8 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Updated 4 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 10 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 7 months ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- A Qemu Proxmox Template builder project using Packer☆43Updated this week
- Slides and videos from talks given at cons☆25Updated 5 months ago
- Yandex browser password recovery☆11Updated 7 months ago
- A simple Meterpreter stager written in Rust.☆43Updated 3 weeks ago
- A fork of the Go language with some tweaks☆51Updated 9 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆45Updated 3 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated last year
- ☆14Updated 11 months ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆29Updated 3 weeks ago
- Recon (Whois)☆15Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 7 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Updated last year
- ☆102Updated this week
- Execute shellcode via ASPNET compiler☆58Updated last month
- masscan with exclusive excludes☆58Updated 2 years ago
- API hooking and code injection made easy!☆40Updated 2 years ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago