fiddyschmitt / File-TunnelLinks
Tunnel TCP connections through a file
☆1,041Updated 2 months ago
Alternatives and similar repositories for File-Tunnel
Users that are interested in File-Tunnel are comparing it to the libraries listed below
Sorting:
- SSH based reverse shell☆1,319Updated 2 weeks ago
- DarkFlare Firewall Piercing (TCP over CDN)☆1,567Updated 4 months ago
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,064Updated last week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆722Updated last month
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆1,358Updated last week
- Reverse Tunnels in Go over HTTP/3 and QUIC☆986Updated last month
- ☆420Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,012Updated last week
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆458Updated last month
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆603Updated last week
- ☆351Updated 2 years ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆427Updated 2 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆687Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆308Updated this week
- Zaps arguments and environment from the process list☆241Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,398Updated 3 weeks ago
- Tools for controlling webcam LED on ThinkPad X230☆501Updated last year
- Credentials Dumper for Linux using eBPF☆1,157Updated last year
- reverse shell using curl☆476Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆1,061Updated 7 months ago
- reverse shell using curl☆216Updated 11 months ago
- A complete terminal user interface (TUI) for LDAP.☆877Updated last month
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆220Updated last year
- ☆567Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆513Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆785Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,307Updated 6 months ago
- CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH☆509Updated 8 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆498Updated 2 weeks ago
- MultiPlatform HTTP Reverse Shell☆241Updated last month