kpcyrd / rshijackLinks
TCP connection hijacker, Rust rewrite of shijack
☆504Updated 7 months ago
Alternatives and similar repositories for rshijack
Users that are interested in rshijack are comparing it to the libraries listed below
Sorting:
- Scriptable network authentication cracker (formerly `badtouch`)☆410Updated last year
- A Comprehensive Web Fuzzer and Content Discovery Tool☆541Updated last year
- Secure multithreaded packet sniffer☆1,191Updated 4 months ago
- Fast directory scanning and scraping tool☆626Updated 2 months ago
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆399Updated 7 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,071Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆601Updated last year
- Tool for extracting information from newly spawned processes☆758Updated 3 weeks ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 10 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆332Updated last year
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- A DNS rebinding attack framework.☆1,109Updated this week
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago
- Bash post exploitation toolkit☆733Updated last year
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Snuffy is a simple command line tool to inspect SSL/TLS data.☆291Updated 4 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- Mallory - MiTM TCP and UDP Proxy☆317Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated last month
- An XSS reverse shell framework☆308Updated 6 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆729Updated 2 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆787Updated 3 months ago