leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆126Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for TunnelVision
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆199Updated last week
- ☆123Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆192Updated 3 weeks ago
- ☆129Updated 7 months ago
- Signature based honeypot detector tool written in Golang☆84Updated 6 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- A list of public attacks on BitLocker☆181Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆104Updated last month
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated 7 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆117Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆146Updated 8 months ago
- An ADCS honeypot to catch attackers in your internal network.☆224Updated 4 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆171Updated 2 months ago
- ☆181Updated 9 months ago
- eBPF hacks☆173Updated 2 months ago
- Remote Command executor☆69Updated last year
- All kinds of tiny shells☆59Updated last year
- Signing-key abuse and update exploitation framework☆121Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆134Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆172Updated 10 months ago
- Linpmem is a linux memory acquisition tool☆74Updated 6 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 7 months ago
- ☆180Updated last month
- nysm is a stealth post-exploitation container.☆237Updated 11 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆120Updated 3 weeks ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆239Updated 9 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago