Set of tools to audit and exploit STUN/TURN servers
☆34Dec 12, 2025Updated 3 months ago
Alternatives and similar repositories for stuncheck
Users that are interested in stuncheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- ☆25Feb 20, 2026Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.☆841Mar 12, 2026Updated 2 weeks ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.☆26Dec 26, 2022Updated 3 years ago
- Camera phishing screen (to take photos from the front and rear cameras)☆69Nov 20, 2025Updated 4 months ago
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆40Jun 13, 2025Updated 9 months ago
- ☆34Mar 20, 2026Updated last week
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Jboss Java Deserialization RCE (CVE-2017-12149)☆13Aug 22, 2019Updated 6 years ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated last month
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- ☆12Mar 10, 2026Updated 2 weeks ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆166Oct 28, 2025Updated 4 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆79Sep 16, 2025Updated 6 months ago
- ☆11Aug 9, 2023Updated 2 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Libretro core for Vircon32☆11Feb 20, 2026Updated last month
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- a p2p socket proxy based on toxcore☆12Jun 7, 2016Updated 9 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- ☆10Jul 3, 2021Updated 4 years ago
- ☆18Oct 28, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Dockerfile for the Iodine TCP-over-DNS tunnel☆14Nov 18, 2015Updated 10 years ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- ☆14Aug 19, 2023Updated 2 years ago
- basic http request over tor using arti.☆23Jan 28, 2026Updated last month
- A script for brute forcing Roku TVs and installing applications remotely.☆12Mar 25, 2023Updated 3 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆37Sep 8, 2025Updated 6 months ago
- A powerful OSINT (Open-Source Intelligence) tool for searching usernames across 50+ social media platforms, with AI-powered analysis and …☆20Sep 7, 2025Updated 6 months ago