139 skills found · Page 1 of 5
wangyu- / Udp2rawA Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
erebe / WstunnelTunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
SadeghHayeri / GreenTunnelGreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.
Ekultek / WhatWafDetect and bypass web application firewalls and protection systems
samyk / SlipstreamNAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
x011 / Smtp Tunnel ProxyA high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
FunnyWolf / PystingerBypass firewall for traffic forwarding using webshell
vincentcox / Bypass Firewalls By DNS HistoryFirewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
SECFORCE / TunnaTunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
cw1997 / NATBypass一款lcx.exe在golang下的实现, 可用于内网穿透, 建立TCP反弹隧道用以绕过防火墙入站限制等, This tool is used to establish reverse tunnel in NAT network environment, it can bypass firewall inbound restriction, support all functions of lcx.exe
sysdream / ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
SamNet-dev / PaqctlUnified proxy manager for bypassing firewalls - supports Paqet (KCP/raw socket) and GFW-Knocker (violated TCP/QUIC) with dual-backend simultaneous operation
matrixleons / Evilwafevilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
carloslack / KoviDRed-Team LKM
zhxie / IkagoIkaGo is a proxy which helps bypassing UDP blocking, UDP QoS and NAT firewall written in Go.
umutatalar / PingRATPingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
krabelize / IcmpdoorICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
abdulkadir-gungor / JPGtoMalwareIt embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
mengskysama / Shadowsocks RmA fast tunnel proxy that helps you bypass firewalls
assetnote / NewtownerAbuse trust-boundaries to bypass firewalls and network controls