leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆135Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆265Updated this week
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- reverse shell using curl☆207Updated 7 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆103Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆250Updated last month
- ☆83Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆263Updated 9 months ago
- eBPF hacks☆187Updated 9 months ago
- ☆134Updated last year
- Hunting for passwords with deep learning☆225Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆62Updated 11 months ago
- ☆134Updated 2 years ago
- ☆78Updated 3 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆277Updated 6 months ago
- ☆71Updated 2 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆94Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆254Updated last month
- nysm is a stealth post-exploitation container.☆261Updated 3 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆132Updated 11 months ago
- A list of public attacks on BitLocker☆331Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆379Updated this week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆110Updated 2 months ago
- Linux Persistence Toolkit☆67Updated 3 years ago
- LD_PRELOAD rootkit☆138Updated last year
- ☆42Updated last year