leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆136Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆261Updated 4 months ago
- ☆85Updated 2 years ago
- reverse shell using curl☆216Updated 11 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆282Updated 11 months ago
- Signing-key abuse and update exploitation framework☆132Updated 8 months ago
- ☆137Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆66Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- ☆133Updated 2 years ago
- eBPF hacks☆195Updated last year
- ☆76Updated 6 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆271Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆261Updated 5 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆304Updated 3 weeks ago
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- nysm is a stealth post-exploitation container.☆265Updated 7 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Updated last year
- All kinds of tiny shells☆65Updated 3 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆201Updated last week
- ☆98Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- LD_PRELOAD rootkit☆137Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆249Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆190Updated last month