leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
โ135Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- A delicious, but malicious SSL-VPN server ๐ฎโ229Updated 6 months ago
- An ADCS honeypot to catch attackers in your internal network.โ289Updated 11 months ago
- Nuke It From Orbit - remove AV/EDR with physical accessโ259Updated 5 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094โ142Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerโฆโ366Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functionsโ257Updated last week
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.โ289Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.โ195Updated 4 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)โ266Updated 3 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tโฆโ123Updated 4 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scriptsโ306Updated last week
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.โ126Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.โ180Updated last month
- โ191Updated 8 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Eventsโ238Updated last year
- A prototype malware C2 channel using x509 certificates over mTLSโ153Updated last year
- Cheat sheet to detect and remove linux kernel rootkitโ61Updated 5 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.โ371Updated 4 months ago
- Get root via TTY / TIOCSTI stuffingโ76Updated 3 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesโ124Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.โ256Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.โ182Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolโ260Updated 6 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analystsโ157Updated last year
- โ299Updated 2 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detectionโ213Updated this week
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.โ73Updated this week
- โ188Updated last year
- Leak NTLM via Website tab in teams via MS Officeโ78Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ144Updated 9 months ago