leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆136Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- Signing-key abuse and update exploitation framework☆130Updated 5 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- eBPF hacks☆187Updated 10 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆162Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- reverse shell using curl☆207Updated 8 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆63Updated last year
- ☆50Updated 3 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆269Updated 3 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆135Updated last week
- ☆84Updated 2 years ago
- Hunting for passwords with deep learning☆231Updated last year
- ☆132Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- nysm is a stealth post-exploitation container.☆261Updated 4 months ago
- NTP Exfiltration Tool☆146Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆77Updated 5 months ago
- ☆71Updated 3 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆112Updated 3 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆278Updated 7 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆105Updated last year
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.☆41Updated last year
- ☆135Updated last year