stealth / fraud-bridge
ICMP and DNS tunneling via IPv4 and IPv6
☆202Updated last year
Alternatives and similar repositories for fraud-bridge:
Users that are interested in fraud-bridge are comparing it to the libraries listed below
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆194Updated 5 months ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆120Updated 4 months ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 3 years ago
- Explore the network using VPNPivot tool☆269Updated 8 years ago
- A list of Domain Frontable Domains by CDN☆566Updated 3 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆120Updated 4 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆111Updated 8 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year
- SNIcat☆126Updated 3 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Updated 4 years ago
- Replay RDP traffic from PCAP☆191Updated 5 years ago
- Socket over DNS tunnel☆78Updated 5 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆209Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆284Updated 7 years ago
- A keystroke / terminal logger for Linux.☆216Updated 8 months ago
- Decept Network Protocol Proxy☆275Updated 2 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- HORSEPILL rootkit PoC☆225Updated 8 years ago