leviathansecurity / TunnelVision
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
โ130Updated 10 months ago
Alternatives and similar repositories for TunnelVision:
Users that are interested in TunnelVision are comparing it to the libraries listed below
- A delicious, but malicious SSL-VPN server ๐ฎโ215Updated 3 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094โ141Updated 11 months ago
- nysm is a stealth post-exploitation container.โ245Updated last year
- Ping-based Information Lookup and Outbound Transferโ75Updated 11 months ago
- Signature based honeypot detector tool written in Golangโ89Updated this week
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarโฆโ124Updated 4 months ago
- โ122Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.โ192Updated 2 months ago
- Make BASH stealthy and hacker friendly with lots of bash functionsโ241Updated this week
- Nuke It From Orbit - remove AV/EDR with physical accessโ257Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.โ119Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Eventsโ215Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesโ123Updated 9 months ago
- NTP Exfiltration Toolโ138Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tโฆโ121Updated 2 months ago
- An ADCS honeypot to catch attackers in your internal network.โ284Updated 8 months ago
- โ127Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ140Updated 6 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.โ181Updated last week
- Canary Detectionโ164Updated 11 months ago
- Proof of concept for DoS exploitโ53Updated last year
- WallEscape vulnerability in util-linuxโ51Updated 11 months ago
- Cheat sheet to detect and remove linux kernel rootkitโ52Updated 3 months ago
- Signing-key abuse and update exploitation frameworkโ123Updated 2 weeks ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.โ121Updated 11 months ago
- JA4TScan is an active TCP server fingerprinting tool.โ72Updated 6 months ago
- quicmap is a simple yet quic (!) QUIC protocol scannerโ84Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analystsโ137Updated last year
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native execโฆโ117Updated last month
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSONโ113Updated 11 months ago