stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆205Updated 2 weeks ago
Alternatives and similar repositories for fraud-bridge:
Users that are interested in fraud-bridge are comparing it to the libraries listed below
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆193Updated 6 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆121Updated 5 months ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆113Updated last year
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- SNIcat☆126Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆113Updated 9 years ago
- Clone network interface from one host as a tap interface on another host☆59Updated 4 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆250Updated last year
- A list of Domain Frontable Domains by CDN☆568Updated 3 years ago
- Passive DHCP fingerprinting implementation☆51Updated 8 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆777Updated last year
- DHCP option injector☆42Updated 4 years ago
- Linux v4.x.x Rootkit☆90Updated 8 months ago
- Socket over DNS tunnel☆79Updated 5 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated 11 months ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆170Updated 12 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Updated 2 weeks ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 8 months ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- List of real-world threats against endpoint protection software☆215Updated 5 months ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆374Updated 3 years ago