drk1wi / PortspoofLinks
Portspoof
☆2,395Updated last week
Alternatives and similar repositories for Portspoof
Users that are interested in Portspoof are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,786Updated last month
- Passive hostname, domain and IP lookup tool for non-robots☆1,665Updated 3 weeks ago
- SSH-MITM - ssh audits made simple☆1,422Updated 2 weeks ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,736Updated 3 years ago
- CLOSE ACCESS DENIAL.☆1,530Updated 2 weeks ago
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆1,030Updated last year
- Data exfiltration over DNS request covert channel☆876Updated last year
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,998Updated 2 months ago
- ☆3,789Updated last year
- Canarytokens helps track activity and actions on your network.☆1,996Updated 2 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,294Updated 4 months ago
- Official git repo for iodine dns tunnel☆7,491Updated 3 months ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆4,046Updated 3 months ago
- Kippo - SSH Honeypot☆1,709Updated 2 years ago
- Fast Application Layer Scanner☆2,024Updated last week
- HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.☆1,089Updated last week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,382Updated last week
- View HTTP/HTTPS requests made by any Linux program☆4,129Updated 3 weeks ago
- Advanced Honeypot framework.☆1,294Updated 2 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆666Updated last year
- Docker configuration to quickly setup your own Canarytokens.☆638Updated 2 weeks ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,747Updated 4 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,892Updated 2 weeks ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,913Updated last week
- A framework for layer 2 attacks☆818Updated 2 years ago
- Certificate Transparency Log Monitor☆1,114Updated 3 weeks ago
- Tunnel TCP connections through a file☆981Updated last month
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,042Updated last week
- Tracking history of USB events on GNU/Linux☆1,174Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,474Updated 2 years ago