dest-unreach / socat2
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2:
Users that are interested in socat2 are comparing it to the libraries listed below
- Python library for image hashing and deduplication☆11Updated 8 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 6 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Scans tcl for command injection☆17Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- ptrace poke command-line tool☆14Updated 5 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆17Updated 4 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- ☆19Updated 12 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- ☆13Updated 2 years ago
- ☆15Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆20Updated 6 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year