fidian / tcp-port-forwardView external linksLinks
Forward TCP traffic, DNS happens at time of the connection
☆39May 21, 2015Updated 10 years ago
Alternatives and similar repositories for tcp-port-forward
Users that are interested in tcp-port-forward are comparing it to the libraries listed below
Sorting:
- ☆39Oct 12, 2022Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Jan 3, 2023Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- ☆19Oct 2, 2022Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆62Mar 19, 2021Updated 4 years ago
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Jul 25, 2022Updated 3 years ago
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- ksc4cpp is a shellcode framework for windows kernel based on C++☆22Feb 10, 2023Updated 3 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- Demo from the Malware Analysis and Development Webinar☆23Apr 17, 2024Updated last year
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Dec 15, 2025Updated 2 months ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 2 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 4 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆58Sep 7, 2024Updated last year
- Obfuscator as LLVM extension☆108Apr 15, 2022Updated 3 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆63Jan 12, 2026Updated last month
- A little tool to play with the Seclogon service☆328Jul 10, 2022Updated 3 years ago