☆78Jul 12, 2025Updated 10 months ago
Alternatives and similar repositories for tunneltester
Users that are interested in tunneltester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 4 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 9 months ago
- Set of PoC to abuse Windows minifilters functionality☆84May 1, 2026Updated 3 weeks ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆61Oct 24, 2024Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆79Dec 1, 2025Updated 5 months ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆23Apr 13, 2026Updated last month
- ☆28Mar 14, 2026Updated 2 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆28Sep 17, 2024Updated last year
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆46Mar 13, 2026Updated 2 months ago
- ☆24Sep 12, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆20Dec 3, 2024Updated last year
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆99Sep 10, 2025Updated 8 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Proof Of Concepts☆56Jan 4, 2026Updated 4 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆100Apr 2, 2025Updated last year
- Covert data exfiltration via DNS☆53Feb 8, 2025Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 3 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆37Jul 1, 2025Updated 10 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆27Dec 29, 2024Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 8 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆31Oct 16, 2025Updated 7 months ago
- ☆37May 31, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆308Dec 7, 2025Updated 5 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆152Aug 26, 2024Updated last year
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆141Jan 16, 2025Updated last year
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 9 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆49Aug 13, 2025Updated 9 months ago
- ☆19May 22, 2024Updated 2 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆33Sep 5, 2025Updated 8 months ago
- GitLab Attack TOolkit☆34Apr 24, 2026Updated 3 weeks ago