☆76Jul 12, 2025Updated 9 months ago
Alternatives and similar repositories for tunneltester
Users that are interested in tunneltester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 2 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆20Feb 23, 2026Updated last month
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆60Oct 24, 2024Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 4 months ago
- ☆28Mar 14, 2026Updated 3 weeks ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆44Mar 13, 2026Updated last month
- ☆24Sep 12, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆98Sep 10, 2025Updated 7 months ago
- Proof Of Concepts☆56Jan 4, 2026Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 3 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 6 months ago
- ☆37Jul 1, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- ☆39May 31, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆299Dec 7, 2025Updated 4 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆150Aug 26, 2024Updated last year
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- ☆138Jan 16, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 8 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- ☆17May 22, 2024Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆33Sep 5, 2025Updated 7 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 6 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago