stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆200Updated last year
Related projects ⓘ
Alternatives and complementary repositories for fraud-bridge
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆190Updated last month
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆117Updated 2 weeks ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- A keystroke / terminal logger for Linux.☆212Updated 4 months ago
- This is a kernel module invoked reverse shell proof of concept.☆71Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆112Updated last year
- TCP/UDP symmetric encryption tunnel wrapper☆117Updated 4 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 5 years ago
- XFLTReaT tunnelling framework☆326Updated 4 years ago
- A minimal DNS service that can provide spoofed replies☆100Updated last year
- Hide processes as a normal user in Linux.☆255Updated 4 months ago
- A list of Domain Frontable Domains by CDN☆565Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆751Updated 11 months ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆361Updated 9 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆206Updated 8 years ago
- SNIcat☆125Updated 3 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆43Updated 6 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆213Updated 7 years ago
- async mass DNS resolver☆82Updated 9 months ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- A network packet forensics tool for SSH☆253Updated 3 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Replay RDP traffic from PCAP☆187Updated 5 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- An example rootkit that gives a userland process root permissions☆76Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆61Updated 3 years ago
- Rogue AP killer☆88Updated 6 years ago