Obfuscate UDP traffic as RTP
☆26Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for rtptun
Users that are interested in rtptun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated 2 months ago
- ☆15Jul 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 2 months ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- ☆121Jan 7, 2026Updated 3 months ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- TLS wrapper for UDP sessions with active probing protection☆29Feb 5, 2024Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- ☆12Oct 10, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 4 months ago