dest-unreach / socat2Links
socat version 2
☆10Updated 12 years ago
Alternatives and similar repositories for socat2
Users that are interested in socat2 are comparing it to the libraries listed below
Sorting:
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Fork of proxychains with support of multiple chains. Chains are selected according to filters assigned to them.☆18Updated 11 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- Scans tcl for command injection☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- atomfs is a pseudo filesystem for managing container layers☆10Updated last year
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆21Updated 8 months ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- Per-VPN-user network ACLs using Netfilter☆22Updated last month
- ptrace poke command-line tool☆14Updated 5 years ago
- A wrapper for dd☆20Updated 8 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- ☆15Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- One of the active development branches for colordiff☆24Updated 13 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆20Updated 7 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 8 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Modifies running processes on Linux☆25Updated 2 years ago
- tamper resistant audit log☆18Updated 6 years ago