stealth / fraud-bridgeLinks
ICMP and DNS tunneling via IPv4 and IPv6
☆226Updated 9 months ago
Alternatives and similar repositories for fraud-bridge
Users that are interested in fraud-bridge are comparing it to the libraries listed below
Sorting:
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆211Updated 8 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆118Updated 2 years ago
- A keystroke / terminal logger for Linux.☆215Updated last year
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- ☆65Updated 9 years ago
- TCP tunnel over RTP/SIP☆96Updated 5 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆44Updated 7 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆123Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26Updated 6 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆117Updated 10 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Simple shell script to "clone" X.509 certificates☆111Updated 9 months ago
- SNIcat☆128Updated 4 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Updated last year
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 11 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆135Updated 10 years ago