robert / how-to-build-a-tcp-proxy
How to build a TCP proxy, step by step
☆69Updated 4 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy:
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆67Updated 5 years ago
- DPAPI offline decryption utility☆68Updated 2 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆61Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- public exploits☆35Updated last year
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- A PoC for CVE-2020-0601☆337Updated last year
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Kernel Hacking study materials collection☆107Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)☆16Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- ☆52Updated 5 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 8 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆60Updated 5 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 4 years ago
- ☆72Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 7 years ago
- a tool to determine the crypto/encoding algorithm used according to traces from its representation☆130Updated 3 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆100Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago