Surreptitiously exfiltrate data from the browser over DNS
☆422Jul 19, 2020Updated 5 years ago
Alternatives and similar repositories for browsertunnel
Users that are interested in browsertunnel are comparing it to the libraries listed below
Sorting:
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,682Oct 26, 2024Updated last year
- Proxy Unix applications in the terminal☆116Apr 14, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,436Feb 15, 2026Updated 3 weeks ago
- Apply a filter to the events being reported by windows event logging☆263Apr 24, 2021Updated 4 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- ☆332Dec 8, 2022Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Mar 9, 2021Updated 5 years ago
- FestIn - Open S3 Bucket Scanner☆230Dec 4, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Aug 18, 2023Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- A tool to make socks connections through HTTP agents☆718Mar 30, 2021Updated 4 years ago
- A polyglot payload generator☆243Aug 15, 2022Updated 3 years ago
- Execute .Net assemblies using Rundll32.exe☆115Mar 17, 2021Updated 4 years ago