efeali / fragtunnelLinks
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
☆211Updated last year
Alternatives and similar repositories for fragtunnel
Users that are interested in fragtunnel are comparing it to the libraries listed below
Sorting:
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆212Updated 5 months ago
- ☆164Updated 5 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆309Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆334Updated this week
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆121Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆323Updated last month
- Different methods to get current username without using whoami☆177Updated last year
- Everything and anything related to password spraying☆147Updated last year
- ☆304Updated 6 months ago
- Active Directory Authentication Library☆80Updated last month
- Speedy probe-based UDP service scanner☆101Updated 3 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆87Updated 2 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- ☆68Updated 8 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆153Updated 3 months ago
- ☆110Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆204Updated 8 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated 2 months ago
- PowerShell Obfuscator☆207Updated last month
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆243Updated 4 months ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated this week
- ☆161Updated last year
- Repo for all my exploits/PoCs☆53Updated 4 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆277Updated 7 months ago
- Python based GUI for browsing LDAP☆156Updated 2 weeks ago
- A real fake social engineering app☆128Updated 2 months ago