leviathansecurity / TunnelVisionLinks
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
โ135Updated last year
Alternatives and similar repositories for TunnelVision
Users that are interested in TunnelVision are comparing it to the libraries listed below
Sorting:
- A delicious, but malicious SSL-VPN server ๐ฎโ248Updated 3 weeks ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerโฆโ371Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesโ127Updated last year
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.โ99Updated this week
- An ssh honeypot with the XZ backdoor. CVE-2024-3094โ144Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)โ146Updated 11 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkitโ91Updated last year
- eBPF hacksโ187Updated 8 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your networkโ61Updated 10 months ago
- โ82Updated 2 years ago
- โ133Updated 2 years ago
- โ41Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)โ272Updated 5 months ago
- โ95Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analystsโ160Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Eventsโ250Updated last month
- โ63Updated last month
- A prototype malware C2 channel using x509 certificates over mTLSโ152Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functionsโ260Updated last month
- Nuke It From Orbit - remove AV/EDR with physical accessโ262Updated 8 months ago
- Linpmem is a linux memory acquisition toolโ87Updated 2 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarโฆโ131Updated 9 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.โ121Updated last year
- โ134Updated last year
- Signing-key abuse and update exploitation frameworkโ130Updated 3 months ago
- All kinds of tiny shellsโ58Updated 2 years ago
- Get root via TTY / TIOCSTI stuffingโ76Updated 3 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.โ104Updated 3 weeks ago
- Canary Detectionโ187Updated 3 months ago
- โ48Updated 6 months ago