Surreptitiously exfiltrate data from the browser over DNS
☆422Jul 19, 2020Updated 5 years ago
Alternatives and similar repositories for browsertunnel
Users that are interested in browsertunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆92May 10, 2020Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,713Oct 26, 2024Updated last year
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 4 years ago
- SSH-MITM - ssh audits made simple☆1,438Feb 15, 2026Updated last month
- Linux x86_64 Process Injection Utility☆59Mar 9, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,734Feb 3, 2022Updated 4 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- FestIn - Open S3 Bucket Scanner☆230Dec 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆168Dec 10, 2021Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆190Mar 4, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago