leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
☆135Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated last year
- eBPF hacks☆188Updated 7 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆85Updated this week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆237Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- ☆82Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆186Updated 4 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- reverse shell using curl☆206Updated 5 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated 11 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer …☆370Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated 3 weeks ago
- ☆134Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆248Updated 2 weeks ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆271Updated 4 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated 11 months ago
- ☆41Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆261Updated 7 months ago
- NTP Exfiltration Tool☆142Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 9 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆43Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- ☆95Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆85Updated 11 months ago
- ☆133Updated last year