efeali / fragtunnelLinks
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
☆221Updated last year
Alternatives and similar repositories for fragtunnel
Users that are interested in fragtunnel are comparing it to the libraries listed below
Sorting:
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆220Updated 8 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆426Updated 3 months ago
- ☆164Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆371Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆373Updated 4 months ago
- Speedy probe-based UDP service scanner☆116Updated 2 months ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆257Updated 3 months ago
- Different methods to get current username without using whoami☆182Updated last year
- ☆305Updated 9 months ago
- Everything and anything related to password spraying☆151Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆245Updated 2 years ago
- ☆163Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last month
- MultiPlatform HTTP Reverse Shell☆240Updated this week
- Seamless remote browser session control☆224Updated 5 months ago
- ☆74Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆263Updated 8 months ago
- CVE-2025-1974☆90Updated 9 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆109Updated 5 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆204Updated 11 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆252Updated 7 months ago
- A Red Team Activity Hub☆235Updated 2 weeks ago
- nysm is a stealth post-exploitation container.☆263Updated 6 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- A cross platform library to write offensive and defensive security tools in Go☆129Updated last week