fiddyschmitt / File-TunnelLinks
Tunnel TCP connections through a file
☆939Updated 2 weeks ago
Alternatives and similar repositories for File-Tunnel
Users that are interested in File-Tunnel are comparing it to the libraries listed below
Sorting:
- DarkFlare Firewall Piercing (TCP over CDN)☆1,407Updated 5 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆427Updated 7 months ago
- Reverse Tunnels in Go over HTTP/3 and QUIC☆960Updated 2 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆957Updated this week
- Tools for controlling webcam LED on ThinkPad X230☆486Updated 6 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆315Updated 3 weeks ago
- SSH based reverse shell☆1,133Updated last month
- ☆344Updated 2 years ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆574Updated this week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆671Updated 9 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆156Updated 3 months ago
- reverse shell using curl☆457Updated last year
- reverse shell using curl☆206Updated 4 months ago
- ☆390Updated 2 weeks ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆925Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,247Updated 7 months ago
- GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for …☆836Updated 10 months ago
- Zaps arguments and environment from the process list☆200Updated last year
- A sock, with a wire, so you can tunnel all you desire.☆287Updated last year
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆683Updated 2 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 3 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆432Updated last year
- ☆543Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆616Updated 7 months ago
- This repository presents a proof-of-concept of CVE-2023-7028☆240Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated 2 months ago
- A complete terminal user interface (TUI) for LDAP.☆667Updated 3 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆747Updated 5 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,374Updated last year