hotnops / gtunnelLinks
A robust tunelling solution written in golang
☆274Updated 2 years ago
Alternatives and similar repositories for gtunnel
Users that are interested in gtunnel are comparing it to the libraries listed below
Sorting:
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 5 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆163Updated 3 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Updated 4 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Reverse SOCKS5 implementation in Go☆386Updated last month
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆492Updated 4 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆205Updated last year
- Post-exploitation agent for Merlin☆201Updated 6 months ago
- ☆71Updated 3 years ago
- Universal Shared Library User-space Loader☆234Updated 3 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆351Updated 3 years ago
- Dump ntds.dit really fast☆408Updated 4 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆273Updated 5 months ago
- Go library for credentials recovery☆223Updated 3 years ago
- Web shell generator and command line interface.☆85Updated 5 years ago
- easy-to-use payload hosting☆274Updated 3 years ago
- Fork of pkg/debug that adds some additional functionality.☆127Updated last year
- Golang reverse/bind shell generator☆228Updated 3 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆244Updated 5 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆181Updated 2 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Updated 2 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆299Updated 2 years ago
- ☆170Updated 4 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆466Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆225Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆304Updated 4 years ago
- A robust Red Team proxy written in Go.☆166Updated 3 years ago