dest-unreach / socat2
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2:
Users that are interested in socat2 are comparing it to the libraries listed below
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ☆19Updated 12 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Scans tcl for command injection☆17Updated 5 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- ☆18Updated last year
- vyos based isolation of networks☆10Updated 4 years ago
- Modifies running processes on Linux☆24Updated 2 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆21Updated 6 months ago
- 🖼 imgify - Convert any file to PNG and back.☆13Updated last year
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- Notebook collection☆10Updated 6 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- egrets monitors egress☆45Updated 5 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago