Portspoof
☆2,421Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for Portspoof
Users that are interested in Portspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,204Oct 1, 2025Updated 7 months ago
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆10,524Mar 2, 2026Updated 2 months ago
- SSH tarpit that slowly sends an endless banner☆8,449Jun 3, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,536Apr 17, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,691Updated this week
- A fast TCP/UDP tunnel over HTTP☆15,955Apr 30, 2026Updated last week
- View HTTP/HTTPS requests made by any Linux program☆4,158Dec 23, 2025Updated 4 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,584Apr 17, 2026Updated 3 weeks ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,491Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,174Apr 22, 2026Updated 2 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,442Jan 26, 2026Updated 3 months ago
- Tool for extracting information from newly spawned processes☆779May 11, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,333Updated this week
- Adversary Emulation Framework☆11,160Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,603Apr 23, 2026Updated 2 weeks ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,956Nov 19, 2025Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,715Jan 5, 2026Updated 4 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,888May 3, 2026Updated last week
- A Tool for Domain Flyovers☆5,930May 22, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,024Oct 6, 2025Updated 7 months ago
- A collaborative, multi-platform, red teaming framework☆4,442May 1, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,863Jun 15, 2020Updated 5 years ago
- Automagically reverse-engineer REST APIs via capturing traffic☆9,466Apr 27, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,172Apr 18, 2026Updated 3 weeks ago
- Active Directory information dumper via LDAP☆1,402Apr 6, 2025Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,454Nov 20, 2025Updated 5 months ago
- Run PowerShell command without invoking powershell.exe☆1,552Apr 9, 2026Updated last month
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,668Apr 15, 2025Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,604Feb 5, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,199Apr 29, 2026Updated last week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,628Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆4,009Updated this week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,563Jan 10, 2025Updated last year
- Mimikatz implementation in pure Python☆3,303Apr 9, 2026Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,476Oct 1, 2025Updated 7 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago