reverse socks tunneler with ntlm and proxy support
☆29Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for rsockstun
Users that are interested in rsockstun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Jul 29, 2021Updated 4 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- POC tools for exploring SMB over QUIC protocol☆131Apr 6, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 4 months ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Sep 22, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆72Mar 28, 2023Updated 3 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated last year
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Python3 HTTP Server with upload functionality☆21Dec 4, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago