leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆136Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- eBPF hacks☆195Updated last year
- ☆137Updated last year
- Signing-key abuse and update exploitation framework☆132Updated 8 months ago
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 4 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- reverse shell using curl☆216Updated 11 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆281Updated 11 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- ☆85Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆115Updated last year
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- All kinds of tiny shells☆65Updated 3 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- ☆133Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆304Updated 3 weeks ago
- Rebuild of portspoof in GO with additional features.☆28Updated 3 months ago
- Hunting for passwords with deep learning☆235Updated last year
- NTP Exfiltration Tool☆147Updated 2 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆66Updated last year
- ☆97Updated last year
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.☆42Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆260Updated 5 months ago
- ☆81Updated 3 years ago