Forward TCP traffic, DNS happens at time of the connection
☆39May 21, 2015Updated 10 years ago
Alternatives and similar repositories for tcp-port-forward
Users that are interested in tcp-port-forward are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Oct 12, 2022Updated 3 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆109Jan 3, 2023Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆92Oct 10, 2022Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆104Feb 10, 2026Updated last month
- ☆12Jul 11, 2023Updated 2 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Jul 25, 2022Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Jun 20, 2022Updated 3 years ago
- Malware?☆76Oct 26, 2025Updated 4 months ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Lnk crafting and research tools☆147Mar 4, 2026Updated 2 weeks ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 5 years ago
- A little tool to play with the Seclogon service☆326Jul 10, 2022Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆395Jan 9, 2024Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- LdrLoadDll Unhooking☆134Jan 16, 2022Updated 4 years ago
- ☆119Aug 7, 2022Updated 3 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- Obfuscator as LLVM extension☆109Apr 15, 2022Updated 3 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago