hotnops / gtunnelLinks
A robust tunelling solution written in golang
☆268Updated 2 years ago
Alternatives and similar repositories for gtunnel
Users that are interested in gtunnel are comparing it to the libraries listed below
Sorting:
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆147Updated 3 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆189Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- Post-exploitation agent for Merlin☆199Updated 2 months ago
- Universal Shared Library User-space Loader☆229Updated 3 years ago
- ☆72Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆489Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆341Updated 2 years ago
- Dump ntds.dit really fast☆397Updated 3 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆202Updated last year
- Reverse SOCKS5 implementation in Go☆376Updated last year
- easy-to-use payload hosting☆270Updated 3 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- ☆169Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆222Updated 4 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆194Updated 5 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆158Updated 2 years ago
- A little tool to play with Outlook☆208Updated 3 years ago
- Web shell generator and command line interface.☆84Updated 4 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- A robust Red Team proxy written in Go.☆159Updated 3 years ago
- Go library for credentials recovery☆220Updated 2 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆294Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆211Updated 3 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- Find specific users in active directory via their username and logon IP address☆385Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆238Updated 5 years ago