Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Silentbridge Alternatives
Similar projects and alternatives to silentbridge based on common topics and language
-
tap
The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization. (by trustedsec)
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
silentbridge reviews and mentions
-
How to Build the Perfect Red Team Hardware Implant
I don’t handle the drop boxes at my work but I do know for nac bypass we use SilentBridge https://github.com/s0lst1c3/silentbridge currently, although we are evaluating different solutions.
-
Has anyone here attempted to build the mechanical switch Silentbridge rogue device?
I'm trying to build a RPI rogue device for bypassing 802.1x during Red Teaming engagement, that is based on Silentbridge. We have had some success with the basic version, but we have been caught and blocked several times due to a newer 802.1x in place, which should also be bypassable with an addition of passive network tap and AB switching.
-
Need help with setting up an OpenWRT router for wired 802.1x?
As a part of pentest engagement I'm working on I've been tasked with setting up an implant/dropbox that will be plugged into the customer's network and left behind as a 4G backdoor. The network is using 802.1x for port authentication, and I need to create a lab to test whether the device (a RPi running silentbridge) is working correctly and can bypass the port security.
-
A note from our sponsor - InfluxDB
www.influxdata.com | 28 Apr 2024
Stats
s0lst1c3/silentbridge is an open source project licensed under GNU General Public License v3.0 only which is an OSI approved license.
The primary programming language of silentbridge is C.
Popular Comparisons
Sponsored