leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆132Updated 11 months ago
Alternatives and similar repositories for TunnelVision:
Users that are interested in TunnelVision are comparing it to the libraries listed below
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆122Updated last year
- Signing-key abuse and update exploitation framework☆125Updated 2 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆285Updated 9 months ago
- eBPF hacks☆186Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆215Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆216Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆153Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆250Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- ☆95Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆277Updated 8 months ago
- nysm is a stealth post-exploitation container.☆246Updated last year
- Signature based honeypot detector tool written in Golang☆89Updated last month
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆143Updated 3 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆263Updated last month
- Hades Basic Command & Control Server☆88Updated last year
- ☆130Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- PoC for CVE-2024-48990☆98Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆85Updated last year
- reverse shell using curl☆206Updated 2 months ago