fiddyschmitt / File-TunnelLinks
Tunnel TCP connections through a file
☆967Updated this week
Alternatives and similar repositories for File-Tunnel
Users that are interested in File-Tunnel are comparing it to the libraries listed below
Sorting:
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆710Updated 2 weeks ago
- SSH based reverse shell☆1,269Updated this week
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆440Updated last month
- ☆353Updated 2 years ago
- ☆407Updated last month
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆977Updated last week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,360Updated last month
- Reverse Tunnels in Go over HTTP/3 and QUIC☆980Updated last month
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,022Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆590Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,288Updated 3 months ago
- ☆563Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆763Updated 10 months ago
- Network Security Sniffer☆836Updated last month
- Zaps arguments and environment from the process list☆235Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆271Updated last month
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 7 months ago
- reverse shell using curl☆466Updated last year
- DarkFlare Firewall Piercing (TCP over CDN)☆1,536Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆372Updated last month
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆509Updated last year
- Tools for controlling webcam LED on ThinkPad X230☆496Updated 11 months ago
- Original PoC for CVE-2023-32784☆646Updated 2 years ago
- A complete terminal user interface (TUI) for LDAP.☆813Updated 2 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆490Updated 2 weeks ago
- A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.☆709Updated 2 weeks ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆681Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆437Updated 2 years ago
- Because AV evasion should be easy.☆828Updated 11 months ago