dest-unreach / socat2
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2:
Users that are interested in socat2 are comparing it to the libraries listed below
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Scans tcl for command injection☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- dnsoverhttps - D'oh!☆14Updated 6 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Fork of proxychains with support of multiple chains. Chains are selected according to filters assigned to them.☆18Updated 11 years ago
- A library and tool for discovering and mapping Controlling TTYs in Linux.☆23Updated 9 months ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Wireshark dissector (written in Lua) for dissecting the WireGuard tunneling protocol.☆47Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Modifies running processes on Linux☆25Updated 2 years ago
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆21Updated 7 months ago
- ☆19Updated 12 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 8 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- Per-VPN-user network ACLs using Netfilter☆22Updated 2 weeks ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Some stuff about telecom security☆14Updated 9 years ago
- ☆13Updated 7 years ago