efeali / fragtunnel
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
☆158Updated 7 months ago
Alternatives and similar repositories for fragtunnel:
Users that are interested in fragtunnel are comparing it to the libraries listed below
- ☆281Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆159Updated 4 months ago
- This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be…☆196Updated last month
- A BloodHound collector for Microsoft Configuration Manager☆275Updated 2 weeks ago
- ShellSweeping the evil.☆161Updated last month
- An ADCS honeypot to catch attackers in your internal network.☆248Updated 6 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆176Updated 9 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆233Updated 9 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆268Updated 2 months ago
- Everything and anything related to password spraying☆128Updated 7 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆347Updated 9 months ago
- A Slack bot phishing framework for Red Teaming exercises☆160Updated 8 months ago
- ☆185Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆259Updated 2 months ago
- Nameless C2 - A C2 with all its components written in Rust☆253Updated 3 months ago
- A Red Team Activity Hub☆182Updated this week
- Ping-based Information Lookup and Outbound Transfer☆76Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆236Updated 5 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆141Updated this week
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆333Updated this week
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆100Updated 11 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆329Updated 2 months ago
- ☆280Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆235Updated 2 months ago
- Different methods to get current username without using whoami☆173Updated 11 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆248Updated 5 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆182Updated 6 months ago
- Lab used for workshop and CTF☆166Updated 3 months ago
- PowerShell Obfuscator☆104Updated 7 months ago