fiddyschmitt / File-TunnelLinks
Tunnel TCP connections through a file
☆929Updated 2 weeks ago
Alternatives and similar repositories for File-Tunnel
Users that are interested in File-Tunnel are comparing it to the libraries listed below
Sorting:
- Reverse Tunnels in Go over HTTP/3 and QUIC☆957Updated last month
- DarkFlare Firewall Piercing (TCP over CDN)☆1,288Updated 4 months ago
- ☆391Updated 2 months ago
- SSH based reverse shell☆1,115Updated 2 weeks ago
- reverse shell using curl☆457Updated last year
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆424Updated 7 months ago
- Tools for controlling webcam LED on ThinkPad X230☆485Updated 6 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,083Updated 10 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,210Updated 6 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆918Updated 2 weeks ago
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆948Updated last month
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆667Updated 9 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆680Updated 2 months ago
- ☆344Updated 2 years ago
- The Noisy Sockets CLI☆261Updated 8 months ago
- ☆543Updated last year
- GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for …☆833Updated 9 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆430Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆366Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- A complete terminal user interface (TUI) for LDAP.☆652Updated this week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆568Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆652Updated 3 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆790Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆229Updated 6 months ago
- MultiPlatform HTTP Reverse Shell☆236Updated 8 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆557Updated last month
- VMM for native-performance sandboxing☆602Updated this week