jrozner / slipstream
A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/slipstream
☆42Updated 4 years ago
Alternatives and similar repositories for slipstream:
Users that are interested in slipstream are comparing it to the libraries listed below
- ☆11Updated 2 years ago
- DNS server for pentesters☆49Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆51Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 4 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- A fork of openssh-portable for penetration testing purposes.☆11Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- ☆24Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- C# User Simulation☆32Updated 2 years ago
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- A framework for exploiting padding oracles in network-based applications☆26Updated last year
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 7 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- ☆31Updated 3 years ago
- ☆25Updated 3 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆45Updated 5 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- A rogue DNS detector☆23Updated last year
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Red Team Automation tool powered by go and terraform☆28Updated 3 years ago