leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
โ128Updated 8 months ago
Alternatives and similar repositories for TunnelVision:
Users that are interested in TunnelVision are comparing it to the libraries listed below
- Make BASH stealthy and hacker friendly with lots of bash functionsโ221Updated last week
- A delicious, but malicious SSL-VPN server ๐ฎโ196Updated last month
- Nuke It From Orbit - remove AV/EDR with physical accessโ252Updated last month
- Tools to Exploit Bitwarden v2023.3.0 with Windows Helloโ29Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094โ143Updated 9 months ago
- An ADCS honeypot to catch attackers in your internal network.โ248Updated 6 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ135Updated 4 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarโฆโ122Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.โ189Updated last week
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tโฆโ115Updated last month
- eBPF hacksโ180Updated last month
- Canary Detectionโ163Updated 9 months ago
- JA4TScan is an active TCP server fingerprinting tool.โ62Updated 4 months ago
- quicmap is a simple yet quic (!) QUIC protocol scannerโ83Updated 10 months ago
- Scan vulnerable drivers on Windows with loldrivers.ioโ171Updated last year
- โ78Updated 9 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.โ118Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesโ123Updated 7 months ago
- Signature based honeypot detector tool written in Golangโ85Updated last month
- Get root via TTY / TIOCSTI stuffingโ66Updated 6 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionโ83Updated 2 months ago
- A list of public attacks on BitLockerโ212Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.โ121Updated 2 months ago
- Ping-based Information Lookup and Outbound Transferโ76Updated 9 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.โ59Updated last month
- โ185Updated 3 months ago
- โ79Updated last year
- nysm is a stealth post-exploitation container.โ241Updated last year
- PowerShell Script Analyzerโ67Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.โ50Updated 2 months ago