mverschu / GrizzlyTunnel
GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.
☆23Updated 2 months ago
Alternatives and similar repositories for GrizzlyTunnel:
Users that are interested in GrizzlyTunnel are comparing it to the libraries listed below
- A script to automate keystrokes through a graphical desktop program.☆34Updated last month
- A simple website to act as a store for havoc modules and extensions☆25Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- masscan with exclusive excludes☆54Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- ECC Public Key Cryptography☆36Updated last year
- AV/EDR companies netblocks☆16Updated 3 years ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- Lifetime AMSI bypass.☆35Updated 8 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ☆27Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆25Updated 9 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- ☆9Updated 4 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 3 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 6 months ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆13Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆18Updated 4 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago