stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆205Updated last month
Alternatives and similar repositories for fraud-bridge
Users that are interested in fraud-bridge are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆121Updated 6 months ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated 2 weeks ago
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 6 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- A keystroke / terminal logger for Linux.☆216Updated 10 months ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Socket over DNS tunnel☆79Updated 5 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆163Updated 7 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Replay RDP traffic from PCAP☆193Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- SNIcat☆126Updated 3 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆113Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Automated 802.1x Bypass☆83Updated 5 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago