fiddyschmitt / File-TunnelLinks
Tunnel TCP connections through a file
☆972Updated 2 weeks ago
Alternatives and similar repositories for File-Tunnel
Users that are interested in File-Tunnel are comparing it to the libraries listed below
Sorting:
- SSH based reverse shell☆1,289Updated this week
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,028Updated last week
- ☆410Updated 2 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆708Updated last week
- DarkFlare Firewall Piercing (TCP over CDN)☆1,543Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆593Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,374Updated 2 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆446Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆981Updated 3 weeks ago
- ☆353Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆737Updated 4 months ago
- Tools for controlling webcam LED on ThinkPad X230☆496Updated last year
- reverse shell using curl☆469Updated last year
- ☆569Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆401Updated 2 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆683Updated last year
- Network Security Sniffer☆838Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,289Updated 4 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆779Updated 10 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆492Updated last month
- Zaps arguments and environment from the process list☆238Updated last year
- A complete terminal user interface (TUI) for LDAP.☆824Updated last week
- SSH over QUIC☆840Updated 2 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆437Updated 2 years ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆690Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆843Updated last week
- Make BASH stealthy and hacker friendly with lots of bash functions☆277Updated this week
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,011Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆241Updated last week