hotnops / gtunnel
A robust tunelling solution written in golang
☆268Updated last year
Alternatives and similar repositories for gtunnel:
Users that are interested in gtunnel are comparing it to the libraries listed below
- 🕳 godoh - A DNS-over-HTTPS C2☆780Updated last year
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- Post-exploitation agent for Merlin☆194Updated 3 weeks ago
- Reverse SOCKS5 implementation in Go☆361Updated last year
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆185Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆337Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆63Updated 6 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆267Updated 3 years ago
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆486Updated 4 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆198Updated 10 months ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆192Updated 4 years ago
- SonicWall SSL-VPN Exploit☆176Updated 4 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆159Updated 2 years ago
- Find specific users in active directory via their username and logon IP address☆383Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- Dump ntds.dit really fast☆392Updated 3 years ago
- TCP Port Redirection Utility☆718Updated 2 years ago
- nray distributed port scanner☆154Updated 2 years ago
- Web shell generator and command line interface.☆84Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆438Updated last year
- Domain Borrowing PoC☆212Updated 4 years ago
- ☆191Updated 5 years ago
- Really stupid re-implementation of invoke-wmiexec☆215Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago