stealth / fraud-bridgeLinks
ICMP and DNS tunneling via IPv4 and IPv6
☆215Updated 6 months ago
Alternatives and similar repositories for fraud-bridge
Users that are interested in fraud-bridge are comparing it to the libraries listed below
Sorting:
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆199Updated 5 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 10 months ago
- A keystroke / terminal logger for Linux.☆216Updated last year
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆115Updated last year
- TCP/UDP symmetric encryption tunnel wrapper☆121Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- SNIcat☆127Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆65Updated 8 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 4 years ago
- TCP tunnel over RTP/SIP☆97Updated 5 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- Simple shell script to "clone" X.509 certificates☆108Updated 6 months ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆45Updated 7 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 5 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆115Updated 10 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆41Updated 5 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 10 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆152Updated 6 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆61Updated last month
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆134Updated 9 years ago
- Enumeration of IP hops using existing TCP connections☆73Updated 2 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆108Updated 9 years ago
- Linux v4.x.x Rootkit☆93Updated last year
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago