stealth / fraud-bridgeLinks
ICMP and DNS tunneling via IPv4 and IPv6
☆222Updated 8 months ago
Alternatives and similar repositories for fraud-bridge
Users that are interested in fraud-bridge are comparing it to the libraries listed below
Sorting:
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆210Updated 7 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- A keystroke / terminal logger for Linux.☆217Updated last year
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆117Updated 2 years ago
- TCP tunnel over RTP/SIP☆96Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Rogue AP killer☆92Updated 7 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆122Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- SNIcat☆128Updated 4 years ago
- ☆46Updated 5 years ago
- Linux v4.x.x Rootkit☆94Updated last year
- https://git.torproject.org/pluggable-transports/meek.git☆116Updated 10 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆44Updated 3 years ago
- ☆65Updated 9 years ago
- RDP honeypot☆68Updated 6 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysis☆109Updated 8 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Updated 5 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Simple shell script to "clone" X.509 certificates☆111Updated 8 months ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 12 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 5 years ago