blechschmidt / fakerouteLinks
IPv4 and IPv6 traceroute fake hop generator through IP spoofing
☆112Updated 10 months ago
Alternatives and similar repositories for fakeroute
Users that are interested in fakeroute are comparing it to the libraries listed below
Sorting:
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- Zero-trust SSH CA☆29Updated 11 months ago
- A tiny Tor client implementation (in pure python).☆133Updated last year
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- Figlet fonts for crimes☆46Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆124Updated this week
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Global Socket Server☆36Updated 3 months ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- SoniControl - the first ultrasonic firewall☆93Updated 2 years ago
- IPv6 auto discovery tool☆87Updated last month
- SSH proxy with HASSH firewalling capabilities☆28Updated 5 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆23Updated 3 years ago
- Source to www.draw.io☆99Updated 6 years ago
- AXFR all the things!☆26Updated last month
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- DNS Firewall Enforcer☆50Updated 6 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆110Updated 11 months ago
- 🔪 System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.☆71Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Wireshark dissector (written in Lua) for dissecting the WireGuard tunneling protocol.☆49Updated 7 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆27Updated 7 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆115Updated 5 years ago
- a more secure way to force programs to exclusively use tor network☆202Updated 3 years ago
- ☆32Updated 8 months ago
- Command-line monitor for Tor.☆137Updated last year