twelvesec / port-forwardingLinks
Tunneling and Port Forwarding Cheat Sheet
☆160Updated 2 years ago
Alternatives and similar repositories for port-forwarding
Users that are interested in port-forwarding are comparing it to the libraries listed below
Sorting:
- A compact guide to network pivoting for penetration testings / CTF challenges.☆213Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- ☆60Updated 3 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆86Updated 4 months ago
- Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targ…☆76Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆58Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆164Updated last month
- My Password Cracking Methodology☆83Updated 2 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆94Updated last week
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- ☆67Updated 3 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Updated 3 years ago
- Simple HTTP listener for security testing☆117Updated 10 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- ☆38Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- Pwning Sudo Rules☆28Updated 3 years ago
- CLI monitor for windows process- & file activity☆90Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆46Updated last year
- Automate converting webshells into reverse shells.☆70Updated this week
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆160Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆98Updated 2 months ago
- Exploit to dump ipmi hashes☆36Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆94Updated 2 years ago
- Just some things that have some cool uses☆114Updated this week