mverschu / GrizzlyTunnel
GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.
☆23Updated 2 months ago
Alternatives and similar repositories for GrizzlyTunnel:
Users that are interested in GrizzlyTunnel are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated last month
- masscan with exclusive excludes☆54Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆27Updated last year
- ECC Public Key Cryptography☆36Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 7 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Small collection of Active Directory pentesting tools.☆29Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 9 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆64Updated last year
- Offensive Powershell obfuscator☆25Updated 6 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- ☆9Updated 4 months ago
- ☆11Updated 3 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year