jhump / grpctunnelView external linksLinks
gRPC Tunneling
☆118Sep 10, 2025Updated 5 months ago
Alternatives and similar repositories for grpctunnel
Users that are interested in grpctunnel are comparing it to the libraries listed below
Sorting:
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- A Go API for generating .go source files☆24Jul 12, 2022Updated 3 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- ☆19Feb 27, 2022Updated 3 years ago
- Unicode-aware string utilities for Go☆22Sep 1, 2022Updated 3 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- Backend for Nuclear Pond☆22Dec 7, 2023Updated 2 years ago
- ☆23Apr 28, 2024Updated last year
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Channels for gRPC: custom transports☆225Nov 11, 2025Updated 3 months ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Reflection (Rich Descriptors) for Go Protocol Buffers☆1,474Jan 21, 2026Updated 3 weeks ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- 🚨 slog: Betterstack handler☆13Feb 2, 2026Updated last week
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A stand-alone gRPC based authentication API. Easily integrate authentication into any custom project. Authenticator takes care of user cr…☆14Jul 13, 2023Updated 2 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- Run Go executables under llvm-mca☆13Apr 1, 2022Updated 3 years ago
- Configurable codecs for connect-go☆15Mar 10, 2024Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Reflective protobuffer APIs☆65Dec 5, 2024Updated last year
- ☆37Oct 27, 2017Updated 8 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Library for building dynamic proxies, routers and traffic mixers from a set of composable abstract network components☆16Jun 6, 2023Updated 2 years ago
- A Rust port of BuntDB☆15Aug 5, 2021Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆19Apr 30, 2021Updated 4 years ago