hackerschoice / gs-transfer
Secure File Transfer via Global Socket Bounce Network
☆24Updated 4 years ago
Alternatives and similar repositories for gs-transfer:
Users that are interested in gs-transfer are comparing it to the libraries listed below
- THC "R U There" network discovery tool☆27Updated 4 years ago
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- ☆22Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- ☆27Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- quality of life☆18Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 6 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- ☆37Updated 2 years ago