dest-unreach / socat2
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2:
Users that are interested in socat2 are comparing it to the libraries listed below
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆21Updated 4 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- Scans tcl for command injection☆17Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- ☆19Updated 12 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.☆11Updated 2 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- atomfs is a pseudo filesystem for managing container layers☆10Updated last year
- sign elf binaries with GPG☆18Updated 8 years ago
- The TCP Scanner☆24Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Linux and Windows Hardening Points☆12Updated 6 years ago
- the puppy proxy☆22Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- egrets monitors egress☆46Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- A Lua/Python Bytecode Disassembler written in C, without external dependencies☆13Updated 7 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Modifies running processes on Linux☆24Updated 2 years ago