fiddyschmitt / File-Tunnel
Tunnel TCP connections through a file
☆925Updated 2 months ago
Alternatives and similar repositories for File-Tunnel:
Users that are interested in File-Tunnel are comparing it to the libraries listed below
- Reverse Tunnels in Go over HTTP/3 and QUIC☆949Updated 2 weeks ago
- DarkFlare Firewall Piercing (TCP over CDN)☆1,271Updated 2 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆409Updated 5 months ago
- Tools for controlling webcam LED on ThinkPad X230☆480Updated 4 months ago
- SSH based reverse shell☆1,055Updated last week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆562Updated this week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,150Updated 4 months ago
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆919Updated 2 weeks ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆655Updated 7 months ago
- ☆384Updated this week
- reverse shell using curl☆454Updated 11 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆895Updated last week
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆169Updated 9 months ago
- ☆340Updated last year
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆674Updated last week
- MultiPlatform HTTP Reverse Shell☆231Updated 6 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated 11 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆246Updated this week
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆412Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated 7 months ago
- reverse shell using curl☆205Updated last month
- Zaps arguments and environment from the process list☆197Updated 11 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆590Updated 3 weeks ago
- ☆532Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆146Updated this week
- Credentials Dumper for Linux using eBPF☆1,136Updated 6 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,047Updated 8 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆185Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆353Updated 11 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆511Updated 3 weeks ago