facebookarchive / WEASELLinks
DNS covert channel implant for Red Teams.
☆732Updated 5 years ago
Alternatives and similar repositories for WEASEL
Users that are interested in WEASEL are comparing it to the libraries listed below
Sorting:
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆606Updated last year
- A guide and tool for cracking ssh known_hosts files with hashcat☆336Updated last year
- GTRS - Google Translator Reverse Shell☆617Updated 10 months ago
- Data exfiltration over DNS request covert channel☆872Updated last year
- A script that automates generation of OpenSSL reverse shells☆302Updated 4 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆402Updated 6 years ago
- A mostly-serverless distributed hash cracking platform☆813Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆630Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- mXtract - Memory Extractor & Analyzer☆594Updated 3 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆401Updated 7 years ago
- Modern tactical exploitation toolkit.☆850Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆396Updated 5 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 3 months ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆420Updated 2 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆526Updated 4 years ago
- AI-based, context-driven network device ranking☆299Updated last year
- A Golang implant that uses Slack as a command and control server☆464Updated 2 years ago
- Open source offensive security platform for red team, by red team.☆386Updated 7 years ago
- Bash post exploitation toolkit☆741Updated 2 years ago
- Learning Shodan through katas☆466Updated 5 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆471Updated 3 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆701Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- A fully functional DanderSpritz lab in 2 commands☆433Updated 6 years ago
- $50 Million CTF from Hackerone - Writeup☆595Updated 6 years ago
- A database of common, interesting or useful commands, in one handy referable form☆750Updated last year