efeali / fragtunnelLinks
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
☆220Updated last year
Alternatives and similar repositories for fragtunnel
Users that are interested in fragtunnel are comparing it to the libraries listed below
Sorting:
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆221Updated 9 months ago
- ☆163Updated 2 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆430Updated 3 months ago
- Different methods to get current username without using whoami☆185Updated last year
- PoC that downloads an executable from a public SSL certificate☆135Updated 6 months ago
- ☆306Updated 10 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- ☆75Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆247Updated 2 years ago
- Everything and anything related to password spraying☆151Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated 2 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆254Updated 7 months ago
- Active Directory Authentication Library☆86Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆263Updated 8 months ago
- ☆166Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆109Updated 6 months ago
- Our Tips&Tricks☆128Updated 11 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆431Updated 2 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 8 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆382Updated 5 months ago
- Speedy probe-based UDP service scanner☆117Updated 3 months ago