leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆130Updated 9 months ago
Alternatives and similar repositories for TunnelVision:
Users that are interested in TunnelVision are comparing it to the libraries listed below
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆214Updated 10 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated 10 months ago
- Signing-key abuse and update exploitation framework☆123Updated 2 weeks ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆84Updated 11 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- Canary Detection☆164Updated 10 months ago
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆242Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆350Updated 10 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆118Updated 3 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical access☆253Updated 2 months ago
- An ADCS honeypot to catch attackers in your internal network.☆280Updated 7 months ago
- reverse shell using curl☆205Updated 10 months ago
- Traps web spiders☆66Updated 4 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆114Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆99Updated last year
- PowerShell Script Analyzer☆67Updated last year
- ☆65Updated 2 years ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆82Updated 7 months ago
- ☆92Updated last year
- ☆122Updated last year
- eBPF hacks☆182Updated 2 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆250Updated 6 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 3 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆447Updated 3 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆234Updated this week
- A delicious, but malicious SSL-VPN server 🌮☆205Updated 2 months ago
- nysm is a stealth post-exploitation container.☆243Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year