dest-unreach / socat2Links
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2
Users that are interested in socat2 are comparing it to the libraries listed below
Sorting:
- Decryption utility for PGP Whole Disk Encryption☆20Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- egrets monitors egress☆46Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A local scanner for vulnerable web applications☆40Updated last month
- tcpslice concatenates multiple pcap files together, or extracts time slices from one or more pcap files.☆75Updated 3 months ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆87Updated 10 months ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated last year
- Command line utility for parsing certificates☆65Updated 4 years ago
- Open Source Network Security Platform☆40Updated 16 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆17Updated 6 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A framework to track the evolution of Operating Systems over time☆61Updated last year
- Hybrid Port Knocking System☆22Updated 4 years ago