sailro / Bdtunnel
BoutDuTunnel is able to create virtual connections tunnelled in HTTP requests.
☆99Updated 3 years ago
Alternatives and similar repositories for Bdtunnel:
Users that are interested in Bdtunnel are comparing it to the libraries listed below
- Open source exploit framework made in C#☆54Updated 2 months ago
- MS15-076 Privilege Escalation☆100Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆66Updated 10 years ago
- An Advanced Web Crawler and DirBuster☆112Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated last year
- Implementation of the .NET Profiler DLL hijack in C#☆98Updated 6 years ago
- Support x86 and x64☆66Updated 3 years ago
- injecting arbitrary codes in memory to bypass common antivirus solutions☆165Updated 7 years ago
- Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).☆21Updated 6 years ago
- A command shell wrapper using only WMI for Microsoft Windows☆332Updated 7 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Updated 8 years ago
- Windows Remote Access Trojan (RAT)☆80Updated 9 years ago
- PoC dlls for Task Scheduler COM Hijacking☆92Updated 8 years ago
- Search hashes in different website.☆33Updated 4 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- CVE20178570☆95Updated 7 years ago
- ☆79Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 9 years ago
- Small modification version of p0wnedShell☆40Updated 8 years ago
- C# Dns Proxy with M.I.T.M capability☆31Updated 6 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- C# bindings for the Metasploit RPC☆21Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆51Updated 9 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆124Updated 4 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Updated 12 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- ☆86Updated last year
- OpenSource cross-platform python security toolkit (remote shell)☆45Updated 2 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆240Updated 3 years ago