Transparently tunnel your IP traffic through ICMP echo and reply packets.
☆3,237Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for icmptunnel
Users that are interested in icmptunnel are comparing it to the libraries listed below
Sorting:
- IP over ICMP☆471Aug 21, 2024Updated last year
- Simple reverse ICMP shell☆1,616Apr 6, 2018Updated 7 years ago
- It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.☆707Aug 10, 2022Updated 3 years ago
- ☆3,839Mar 14, 2024Updated last year
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago
- Exploitation Framework for Embedded Devices☆13,014Mar 2, 2026Updated last week
- Official git repo for iodine dns tunnel☆7,668Sep 4, 2025Updated 6 months ago
- Advanced CPU-based password recovery utility☆2,253Sep 30, 2022Updated 3 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable U…☆8,366Oct 12, 2025Updated 4 months ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- Monitor the output of terminals and processes.☆1,011Dec 22, 2015Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- A fast TCP/UDP tunnel over HTTP☆15,684Feb 15, 2026Updated 3 weeks ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,064Aug 31, 2021Updated 4 years ago
- Share your terminal as a web application☆19,416Aug 1, 2024Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,351Jan 22, 2017Updated 9 years ago
- Pingtunnel is a tool that send TCP/UDP traffic over ICMP☆3,606Feb 14, 2026Updated 3 weeks ago
- A book-in-progress about the Linux kernel and its insides.☆32,206Mar 2, 2026Updated last week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,154Mar 6, 2025Updated last year
- A tool to dump the login password from the current linux user☆4,087Sep 5, 2025Updated 6 months ago
- Gryffin is a large scale web security scanning platform.☆2,060Feb 12, 2021Updated 5 years ago
- A hacky debugger UI for hackers☆6,354Jan 30, 2025Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,316Jul 27, 2021Updated 4 years ago
- An experiment to authenticate web sessions with SSH - http://demo-ssh.32b6.com☆723Nov 18, 2015Updated 10 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,052Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,397Jun 5, 2025Updated 9 months ago
- A PowerShell TCP/IP swiss army knife.☆574May 1, 2017Updated 8 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,271Sep 4, 2022Updated 3 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,896Oct 23, 2020Updated 5 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,662Sep 25, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Malicious traffic detection system☆8,264Updated this week
- The fastest path to AI-powered full stack observability, even for lean teams.☆77,957Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,840Jun 15, 2020Updated 5 years ago
- Sniffing browser history using HSTS☆937Aug 5, 2017Updated 8 years ago