stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆199Updated last year
Related projects ⓘ
Alternatives and complementary repositories for fraud-bridge
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆190Updated last month
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆116Updated this week
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆112Updated last year
- TCP/UDP symmetric encryption tunnel wrapper☆117Updated 4 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- A keystroke / terminal logger for Linux.☆212Updated 4 months ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆70Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆66Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- SNIcat☆125Updated 3 years ago
- TCP tunnel over RTP/SIP☆91Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆105Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆210Updated 4 years ago
- Watches for trigger packets, runs commands or spawns a shell☆23Updated 5 years ago
- a low-interaction honeypot☆95Updated 7 years ago
- Repository holding all alternatives of *nix backdoors.☆154Updated 9 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆57Updated 2 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆160Updated 6 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆361Updated 9 years ago
- File transfer via DNS☆68Updated 7 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆107Updated 9 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 5 years ago
- Replay RDP traffic from PCAP☆186Updated 5 years ago
- A "tiny" meterpreter stager☆127Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 11 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 4 years ago