dwisiswant0 / unch
Hides message with invisible Unicode characters
☆93Updated 7 months ago
Alternatives and similar repositories for unch
Users that are interested in unch are comparing it to the libraries listed below
Sorting:
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆89Updated 10 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated last week
- A fork of the Go language with some tweaks☆50Updated 3 months ago
- Canary Detection☆168Updated last year
- Drill into WARC web archives☆138Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆219Updated 5 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆45Updated last month
- Find what egress ports are allowed☆42Updated 2 years ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- Speedy probe-based UDP service scanner☆86Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆143Updated 8 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆73Updated 10 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆168Updated 11 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆126Updated 6 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, and GitHub☆59Updated 2 weeks ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆65Updated 7 months ago
- masscan with exclusive excludes☆56Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Access All Networks: an offensive multitool against 802.1X☆16Updated 4 months ago
- In-Memory Rootkit For Linux☆69Updated 2 weeks ago
- ☆95Updated last year
- Rebuild of portspoof in GO with additional features.☆17Updated last week
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆132Updated 6 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 6 months ago
- Signature based honeypot detector tool written in Golang☆93Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Lfi Scan Tool☆109Updated last year