stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆202Updated last year
Alternatives and similar repositories for fraud-bridge:
Users that are interested in fraud-bridge are comparing it to the libraries listed below
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆113Updated last year
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆120Updated 4 months ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated 6 months ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆362Updated 10 years ago
- A keystroke / terminal logger for Linux.☆216Updated 8 months ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- SNIcat☆126Updated 3 years ago
- Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.☆164Updated 7 years ago
- Linux v4.x.x Rootkit☆89Updated 8 months ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆86Updated 3 months ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆249Updated last year
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- Rogue AP killer☆89Updated 7 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆105Updated 9 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- ☆65Updated 8 years ago
- unix wildcard attacks☆131Updated 6 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆150Updated 5 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆169Updated 12 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- File transfer via DNS☆71Updated 7 years ago
- a linux process hacker tool☆83Updated 5 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago