dest-unreach / socat2Links
socat version 2
☆10Updated 13 years ago
Alternatives and similar repositories for socat2
Users that are interested in socat2 are comparing it to the libraries listed below
Sorting:
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 8 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- egrets monitors egress☆46Updated 5 years ago
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆82Updated 2 months ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated this week
- ☆25Updated 10 years ago
- A local scanner for vulnerable web applications☆41Updated this week
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated 2 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Quantum Insert/FoxAcid case study☆16Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Historical Tracking of MAC Address Assignments☆40Updated this week
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆68Updated 14 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Updated 3 months ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- Enterprise Linux Exploit Mapper☆28Updated 8 years ago
- ☆16Updated 9 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Test Suite for John the Ripper☆25Updated last month