DhavalKapil / icmptunnelView external linksLinks
Transparently tunnel your IP traffic through ICMP echo and reply packets.
☆3,231Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for icmptunnel
Users that are interested in icmptunnel are comparing it to the libraries listed below
Sorting:
- IP over ICMP☆470Aug 21, 2024Updated last year
- Simple reverse ICMP shell☆1,613Apr 6, 2018Updated 7 years ago
- It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.☆706Aug 10, 2022Updated 3 years ago
- ☆3,829Mar 14, 2024Updated last year
- All your IPs are belong to us.☆676Jun 4, 2018Updated 7 years ago
- Exploitation Framework for Embedded Devices☆12,968Jun 10, 2025Updated 8 months ago
- Official git repo for iodine dns tunnel☆7,627Sep 4, 2025Updated 5 months ago
- Advanced CPU-based password recovery utility☆2,258Sep 30, 2022Updated 3 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable U…☆8,317Oct 12, 2025Updated 4 months ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,494Feb 27, 2018Updated 7 years ago
- Monitor the output of terminals and processes.☆1,011Dec 22, 2015Updated 10 years ago
- A fast TCP/UDP tunnel over HTTP☆15,571Sep 14, 2025Updated 5 months ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Jun 17, 2022Updated 3 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,063Aug 31, 2021Updated 4 years ago
- Share your terminal as a web application☆19,397Aug 1, 2024Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,349Jan 22, 2017Updated 9 years ago
- Pingtunnel is a tool that send TCP/UDP traffic over ICMP☆3,574Updated this week
- A book-in-progress about the Linux kernel and its insides.☆32,164Feb 9, 2026Updated last week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,152Mar 6, 2025Updated 11 months ago
- A tool to dump the login password from the current linux user☆4,083Sep 5, 2025Updated 5 months ago
- Gryffin is a large scale web security scanning platform.☆2,061Feb 12, 2021Updated 5 years ago
- A hacky debugger UI for hackers☆6,344Jan 30, 2025Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,277Oct 7, 2022Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,310Jul 27, 2021Updated 4 years ago
- An experiment to authenticate web sessions with SSH - http://demo-ssh.32b6.com☆723Nov 18, 2015Updated 10 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,044Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,305Jun 5, 2025Updated 8 months ago
- A PowerShell TCP/IP swiss army knife.☆571May 1, 2017Updated 8 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,270Sep 4, 2022Updated 3 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,896Oct 23, 2020Updated 5 years ago
- Transmits AM radio on computers without radio transmitting hardware.☆6,652Sep 25, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- Malicious traffic detection system☆8,236Updated this week
- The fastest path to AI-powered full stack observability, even for lean teams.☆77,726Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,830Jun 15, 2020Updated 5 years ago
- Sniffing browser history using HSTS☆936Aug 5, 2017Updated 8 years ago