leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆119Updated 4 months ago
Related projects: ⓘ
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated 5 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆79Updated 6 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆170Updated this week
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆164Updated 2 weeks ago
- ☆91Updated 5 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- nysm is a stealth post-exploitation container.☆235Updated 9 months ago
- Signature based honeypot detector tool written in Golang☆74Updated 3 months ago
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆136Updated last year
- eBPF hacks☆170Updated last week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆236Updated 7 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆119Updated 3 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆182Updated 2 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆119Updated last month
- All kinds of tiny shells☆59Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆339Updated 5 months ago
- Ping-based Information Lookup and Outbound Transfer☆70Updated 5 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆208Updated 5 months ago
- Remote Command executor☆70Updated last year
- ☆122Updated 10 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆121Updated 3 months ago
- NTP Exfiltration Tool☆132Updated 10 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆162Updated last year
- Get root via TTY / TIOCSTI stuffing☆60Updated 2 months ago
- ☆241Updated this week
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆174Updated last month
- Upload files done during my research.☆128Updated 2 weeks ago
- Canary Detection☆159Updated 5 months ago
- Cloud Exploit Framework☆112Updated 2 years ago