stealth / fraud-bridgeLinks
ICMP and DNS tunneling via IPv4 and IPv6
☆226Updated 10 months ago
Alternatives and similar repositories for fraud-bridge
Users that are interested in fraud-bridge are comparing it to the libraries listed below
Sorting:
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆212Updated 9 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Updated last year
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆118Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Simple shell script to "clone" X.509 certificates☆111Updated 10 months ago
- TCP/UDP symmetric encryption tunnel wrapper☆123Updated 5 years ago
- A keystroke / terminal logger for Linux.☆217Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Updated last year
- Rogue AP killer☆91Updated 8 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆62Updated 5 months ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- ☆63Updated 9 years ago
- TCP tunnel over RTP/SIP☆96Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆135Updated 10 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysis☆112Updated 8 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆43Updated 5 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆365Updated 11 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆45Updated 7 years ago
- Linux v4.x.x Rootkit☆92Updated last year
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago