☆75Jul 12, 2025Updated 8 months ago
Alternatives and similar repositories for tunneltester
Users that are interested in tunneltester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated last month
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- ☆59Oct 24, 2024Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- ☆28Mar 14, 2026Updated last week
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆41Mar 13, 2026Updated last week
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆98Sep 10, 2025Updated 6 months ago
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 5 months ago
- ☆36Jul 1, 2025Updated 8 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆78Feb 24, 2026Updated 3 weeks ago
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- ☆39May 31, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆149Aug 26, 2024Updated last year
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- ☆139Jan 16, 2025Updated last year
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- ☆17May 22, 2024Updated last year
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago