backdoor that uses dns to communicate
☆34Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for dnsnet
Users that are interested in dnsnet are comparing it to the libraries listed below
Sorting:
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- A simple way to deploy your own node with Docker! 🐳☆13Aug 17, 2025Updated 6 months ago
- Signing, Keystore, ABI and RLP encoding utilities for EVM / Ethereum / secp256k1 based blockchains. Written in Go with an enterprise frie…☆13Dec 22, 2025Updated 2 months ago
- The Persuader.ai is a tool designed to assist content creators in the creation of persuasive clickbait titles and Call-to-Action (CTA) ph…☆10May 5, 2023Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 weeks ago
- Firefly EVM Connect☆16Feb 4, 2026Updated 3 weeks ago
- Simple tool to decrypt Jenkins encrypted strings☆79Jun 27, 2023Updated 2 years ago
- Hyperledger FireFly Sandbox☆17Updated this week
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- Discover hidden debugging parameters and uncover web application secrets☆247Feb 4, 2026Updated 3 weeks ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Mar 4, 2023Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- text adventure game player☆19Mar 24, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Nov 1, 2022Updated 3 years ago
- badusb联动cobaltrstrike近源攻击☆26Aug 20, 2021Updated 4 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- golang实现通过dcerpc和ntlmssp获取Windows远程主机信息☆28Apr 16, 2024Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Oct 1, 2022Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆62Mar 19, 2021Updated 4 years ago
- Exploring in-memory execution of .NET☆138Apr 20, 2022Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- Do bulk whois lookups and get alerted on domains of interest.☆43Aug 5, 2024Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- ☆35Apr 4, 2023Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆967Jan 10, 2025Updated last year
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- Automated penetration and auxiliary systems, providing XSS, XXE, DNS log, SSRF, RCE, web netcat and other Servers,gin-vue-admin,online ht…☆150Jan 13, 2026Updated last month
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆28Nov 30, 2023Updated 2 years ago
- Udemy course form Zsecurity learning python and ethical hacking☆14May 21, 2021Updated 4 years ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Vector search with Pinecone and Openai to search through contract law textbook. If downloaded, remeber to install all dependencies. Refer…☆13Mar 30, 2023Updated 2 years ago