vanhoefm / tunneltesterLinks
☆71Updated 2 months ago
Alternatives and similar repositories for tunneltester
Users that are interested in tunneltester are comparing it to the libraries listed below
Sorting:
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- Proximity is a MCP security scanner powered with NOVA☆45Updated last week
- Covert data exfiltration via DNS☆49Updated 8 months ago
- Monarch - The Adversary Emulation Toolkit☆63Updated 9 months ago
- A simple Meterpreter stager written in Rust.☆40Updated 2 weeks ago
- Open Source eBPF Malware Analysis Framework☆52Updated 11 months ago
- ☆135Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆70Updated last month
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Execute shellcode via ASPNET compiler☆49Updated last week
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- ☆42Updated last year
- Proof-of-concept modular implant platform leveraging v8☆56Updated 7 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- In-Memory Rootkit For Linux and BSD☆82Updated 2 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆51Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- Userland exec PoC to be used as attack vector technique☆90Updated 3 weeks ago
- Tools for offensive security of NetBackup infrastructures☆40Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated last week
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 11 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆80Updated 6 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year