robert / how-to-build-a-tcp-proxyLinks
How to build a TCP proxy, step by step
☆70Updated 4 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
Sorting:
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆71Updated 5 years ago
- Execute ShellCode / "Inline-Assembler" in Python☆42Updated 8 years ago
- ☆166Updated 6 years ago
- A XPath injection demonstration application☆22Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- A ptrace POC by hooking SSH to reveal provided passwords☆185Updated 8 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆23Updated 10 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Windows DPAPI laboratory☆93Updated 7 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆122Updated 8 months ago
- Reverse engineering challenges☆51Updated 5 years ago
- ☆25Updated 6 years ago
- RDP honeypot☆67Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 9 months ago
- A way to backdoor every process☆66Updated 7 years ago
- simple shellcode generator☆113Updated 8 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆66Updated 7 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- A simple tool to manipulate window objects in Windows☆44Updated 8 years ago