stealth / pscLinks
E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward
☆122Updated 7 months ago
Alternatives and similar repositories for psc
Users that are interested in psc are comparing it to the libraries listed below
Sorting:
- ICMP and DNS tunneling via IPv4 and IPv6☆207Updated 2 months ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- bdvl☆113Updated 3 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆196Updated last month
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- A Linux RAT in C☆34Updated 6 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆64Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆70Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 6 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- UAC Bypass with mmc via alpc☆156Updated 6 years ago
- HP printer security research code☆91Updated 7 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 9 months ago
- ☆65Updated 8 years ago
- Linux v4.x.x Rootkit☆90Updated 10 months ago
- A ptrace POC by hooking SSH to reveal provided passwords☆182Updated 8 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Updated 4 years ago