samyk / slipstream
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
☆1,902Updated last year
Related projects ⓘ
Alternatives and complementary repositories for slipstream
- Connect like there is no firewall. Securely.☆1,535Updated last week
- SSH-MITM - ssh audits made simple☆1,344Updated 2 months ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,723Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,795Updated 2 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,552Updated last year
- Reverse proxies cheatsheet☆1,782Updated last year
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,487Updated 2 weeks ago
- Modlishka. Reverse Proxy.☆4,848Updated 7 months ago
- Interactive CTF Exploration Tool☆1,641Updated 3 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆795Updated 2 years ago
- Monitor linux processes without root permissions☆4,961Updated last year
- ☆3,454Updated 8 months ago
- Credentials Dumper for Linux using eBPF☆1,116Updated 2 months ago
- A tool to dump the login password from the current linux user☆3,818Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,196Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,525Updated 4 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆3,940Updated 3 months ago
- ☆1,232Updated last year
- Network Analysis Tool☆3,026Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,465Updated 3 weeks ago
- A collection of custom security tools for quick needs.☆3,152Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,691Updated 8 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,084Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,173Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,472Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,356Updated 2 years ago
- LKM Linux rootkit☆2,612Updated 3 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,057Updated last month
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,725Updated last year