vanhoefm / tunneltesterLinks
☆75Updated 5 months ago
Alternatives and similar repositories for tunneltester
Users that are interested in tunneltester are comparing it to the libraries listed below
Sorting:
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Covert data exfiltration via DNS☆50Updated 11 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Updated last month
- ☆35Updated 2 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆25Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 5 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Repo for all my exploits/PoCs☆53Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆50Updated 10 months ago
- ☆37Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last week
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated 4 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- Windows Administrator level Implant.☆50Updated last year
- A simple Meterpreter stager written in Rust.☆45Updated 2 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Updated 9 months ago