kost / revsocksLinks
Reverse SOCKS5 implementation in Go
☆363Updated last year
Alternatives and similar repositories for revsocks
Users that are interested in revsocks are comparing it to the libraries listed below
Sorting:
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆440Updated last year
- Post-exploitation agent for Merlin☆194Updated last month
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆337Updated 2 years ago
- A robust tunelling solution written in golang☆269Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆488Updated 4 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆508Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆201Updated 10 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆783Updated last year
- TCP Port Redirection Utility☆722Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- A tool to make socks connections through HTTP agents☆705Updated 4 years ago
- Dump ntds.dit really fast☆394Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,132Updated last month
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆722Updated 8 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆545Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆371Updated 2 weeks ago
- Universal Shared Library User-space Loader☆228Updated 3 years ago
- Various Cobalt Strike BOFs☆646Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆970Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆186Updated 4 years ago
- A C2 framework for initial access in Go☆182Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆937Updated 11 months ago
- A Simple Linux ELF Runtime Crypter☆251Updated 3 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆422Updated 4 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆322Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆861Updated 4 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆671Updated last year
- PIC lsass dumper using cloned handles☆586Updated 2 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆778Updated 2 years ago