robert / how-to-build-a-tcp-proxyLinks
How to build a TCP proxy, step by step
☆71Updated 5 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
Sorting:
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Simple vulnearable Flask web application☆29Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- A XPath injection demonstration application☆22Updated 5 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- ☆166Updated 6 years ago
- Execute ShellCode / "Inline-Assembler" in Python☆42Updated 8 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)☆15Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last year
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 6 years ago
- File transfer via DNS☆75Updated 8 years ago
- Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic☆312Updated last year
- DPAPI offline decryption utility☆72Updated 2 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- ☆29Updated 8 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago