|Number of watchers on Github||43|
|Number of open issues||0|
|Open pull requests||0+|
|Closed pull requests||0+|
|Last commit||over 4 years ago|
|Repo Created||over 4 years ago|
|Repo Last Updated||over 1 year ago|
|Organization / Author||nccgroup|
|Do you use Fenrir? Leave a review!|
|View Fenrir activity|
|View on github|
|Fresh, new opensource launches 🚀🚀🚀|
Trendy new open source projects in your inbox! View examples
Released as open source by NCC Group Plc - http://www.nccgroup.com/
Developed by Dave Spencer, david [dot] spencer [at] nccgroup [dot] com
Released under AGPL see LICENSE for more information
Fenrir was created to prove that it is possible to tunnel network traffic over an RDP virtual channel, however it is still in its infancy. This PoC was to designed to tunnel the meterpreter reverse http shell over the virtual channel The long term goal here will be to create a fully-fledged socks proxy, from Loki to Fenrir and vice versa.
Fenrir is designed to be used with Loki (https://github.com/nccgroup/loki) and Sleipnir (https://github.com/nccgroup/Sleipnir)
Fenrir is very simple to use, use the Metasploit Server and Metasploit Port fields on Lokis initial interface to specify the location of the users metasploit listener, and enter the port number you want to listen on the RDP server (default is 3000).
Once the Start Forwarder button is clicked Fenrir checks if the port is available and if so opens a listening port on 127.0.0.1 Any traffic sent to this port is forwarded on to the server and port that the user specified in the initial Loki interface.