stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆202Updated last year
Alternatives and similar repositories for fraud-bridge:
Users that are interested in fraud-bridge are comparing it to the libraries listed below
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆120Updated 3 months ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆162Updated 7 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆195Updated 4 months ago
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- XFLTReaT tunnelling framework☆326Updated 5 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆67Updated 4 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- A keystroke / terminal logger for Linux.☆214Updated 7 months ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆44Updated 6 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆111Updated 9 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆109Updated 6 years ago
- Socket over DNS tunnel☆76Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Updated 9 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago
- async mass DNS resolver☆83Updated last year
- A ptrace POC by hooking SSH to reveal provided passwords☆181Updated 7 years ago
- Passive DHCP fingerprinting implementation☆50Updated 8 years ago
- TCP tunnel over RTP/SIP☆95Updated 4 years ago