llkat / rsockstunLinks
reverse socks tunneler with ntlm and proxy support
☆60Updated 3 years ago
Alternatives and similar repositories for rsockstun
Users that are interested in rsockstun are comparing it to the libraries listed below
Sorting:
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Reflectively load PE☆104Updated 5 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Updated 6 years ago
- A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly☆46Updated 2 years ago
- Outlook persistence using VSTO add-ins☆87Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Updated 2 years ago
- A Microsoft windows x86_64 Golang shellcode tester that includes example calc.exe shellcode.☆69Updated 7 years ago
- Tool to manage user privileges☆31Updated 6 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- Map remote .NET assemblies to memory for further invocation.☆40Updated 4 years ago
- ☆37Updated 5 years ago
- ☆27Updated 4 years ago
- Reverse shell macro using Word VBA☆16Updated 5 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago
- ☆54Updated 7 months ago
- ☆33Updated 3 years ago
- c# reverse shell poc☆27Updated 7 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- ReVBShell - Reverse VBS Shell☆82Updated last month
- Run python from a single exe☆35Updated 3 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago