reverse socks tunneler with ntlm and proxy support
☆60Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for rsockstun
Users that are interested in rsockstun are comparing it to the libraries listed below
Sorting:
- Reverse SOCKS5 implementation in Go☆395Feb 24, 2026Updated last week
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Windows日志清除工具☆10Apr 3, 2023Updated 2 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65May 13, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- ☆38Sep 14, 2020Updated 5 years ago
- ☆71Feb 15, 2021Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Fly into Gophish with One Click (Infra Automation)☆52Mar 30, 2023Updated 2 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Highlighting different firefox containers in Burp Proxy☆12Dec 4, 2020Updated 5 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Jun 27, 2019Updated 6 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago