kpcyrd / rshijackLinks
TCP connection hijacker, Rust rewrite of shijack
☆516Updated 8 months ago
Alternatives and similar repositories for rshijack
Users that are interested in rshijack are comparing it to the libraries listed below
Sorting:
- A Comprehensive Web Fuzzer and Content Discovery Tool☆543Updated last year
- Scriptable network authentication cracker (formerly `badtouch`)☆409Updated last year
- Secure multithreaded packet sniffer☆1,200Updated 5 months ago
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- Fast directory scanning and scraping tool☆627Updated 3 months ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆730Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 9 months ago
- 🪓 a multi-threaded, low-bandwidth HTTP DOS tool☆94Updated 6 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆400Updated 7 years ago
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆603Updated last year
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Bash post exploitation toolkit☆734Updated 2 years ago
- mXtract - Memory Extractor & Analyzer☆594Updated 3 years ago
- Golang IPv6 address enumeration☆360Updated 6 years ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆653Updated 3 years ago
- NIST-based CVE lookup store and API powered by Rust.☆131Updated 2 weeks ago
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆526Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 2 months ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Modern tactical exploitation toolkit.☆851Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Linkable sandbox explorer☆83Updated 5 months ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- DNS Rebinding Exploitation Framework☆489Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- An XSS reverse shell framework☆309Updated 6 years ago