jrozner / slipstreamLinks
A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/slipstream
☆43Updated 4 years ago
Alternatives and similar repositories for slipstream
Users that are interested in slipstream are comparing it to the libraries listed below
Sorting:
- ☆11Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A rogue DNS detector☆23Updated last year
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- DNS server limitation mapper☆26Updated 6 years ago
- DNS server for pentesters☆49Updated 3 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- ☆34Updated 6 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- ☆25Updated 4 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆36Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- ☆25Updated 4 years ago
- ☆30Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆30Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- SNIcat☆126Updated 3 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- A CLI tool for querying passive DNS services☆41Updated last year