facebookarchive / WEASELLinks
DNS covert channel implant for Red Teams.
☆732Updated 6 years ago
Alternatives and similar repositories for WEASEL
Users that are interested in WEASEL are comparing it to the libraries listed below
Sorting:
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆616Updated 3 months ago
- GTRS - Google Translator Reverse Shell☆625Updated 4 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆303Updated 5 years ago
- Data exfiltration over DNS request covert channel☆881Updated last year
- A mostly-serverless distributed hash cracking platform☆822Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆640Updated 2 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆419Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 6 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544Updated 8 months ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆402Updated 8 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- mXtract - Memory Extractor & Analyzer☆591Updated 4 years ago
- AI-based, context-driven network device ranking☆301Updated last year
- Modern tactical exploitation toolkit.☆855Updated 2 months ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 3 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆576Updated 6 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆703Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆525Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆423Updated last week
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆382Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆501Updated 4 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,190Updated 7 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,611Updated last month
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 8 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆574Updated 7 months ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago