Totally self-contained SSH reverse tunnel written in Go
☆83Mar 12, 2021Updated 4 years ago
Alternatives and similar repositories for holepunch-client
Users that are interested in holepunch-client are comparing it to the libraries listed below
Sorting:
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- Modular rootkit framework.☆30Mar 26, 2021Updated 4 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- a pass-the-hash tool☆104Mar 1, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- A web based drag and drop file transfer tool for sending files across the internet.☆22Apr 19, 2023Updated 2 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Redis tcp map for postfix☆12Jun 28, 2024Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago