Obfuscate UDP traffic as RTP
☆26Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for rtptun
Users that are interested in rtptun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- tunelo encrypts and tunnels UDP traffic (e.g. WireGuard) over a transport protocol like websocket or TCP. Helping to use VPNs in restrict…☆16May 14, 2024Updated last year
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- A docker cheatsheet and some examples ;) created with ❤️☆10Mar 20, 2022Updated 4 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆15Jul 20, 2022Updated 3 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated last month
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- a flexible event system library implemented as a pub/sub model supporting middleware.☆39Mar 2, 2026Updated 3 weeks ago
- ☆122Jan 7, 2026Updated 2 months ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- TLS wrapper for UDP sessions with active probing protection☆29Feb 5, 2024Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Implement Ceph cluster and use it as a StorageClass on kubernetes to claim persistent volume.☆13Feb 16, 2022Updated 4 years ago
- adamak is a user management service.☆35Feb 25, 2022Updated 4 years ago
- http CONNECT tunnel☆10Mar 26, 2020Updated 6 years ago
- Ton Sdk for Flutter☆13Nov 28, 2024Updated last year
- ARMANDroid - anti-repackaging tool for Android apps☆15Dec 18, 2020Updated 5 years ago
- DockerWatcher is a lightweight Go-based tool designed for real-time Docker event monitoring and system notification. It offers flexible r…☆44Aug 9, 2024Updated last year
- using iodine to tunnel IP via DNS☆14Feb 4, 2020Updated 6 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- In-memory security with secure data types☆16Aug 20, 2020Updated 5 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- A simple rendezvous protocol implementation to help NAT traversal or hole punching.☆13Dec 27, 2025Updated 3 months ago
- Android ART Hook - support 4.4 - 10.0 32/64 bit - Xposed API Compat☆18Nov 4, 2024Updated last year
- k8s operator for controlling replica count during time☆11Nov 11, 2023Updated 2 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- 使用python加密so,C动态解密调用☆17Apr 27, 2017Updated 8 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- ☆11Dec 7, 2025Updated 3 months ago
- Bunch of BOF files☆40Jun 30, 2025Updated 8 months ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- cppnat is a NAT reverse proxy tool (aslo known as a hole punching tool) helps you expose your private IP and port and bind them onto a se…☆15Sep 20, 2024Updated last year