Portspoof
☆2,418Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for Portspoof
Users that are interested in Portspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,183Oct 1, 2025Updated 6 months ago
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆10,537Mar 2, 2026Updated last month
- SSH tarpit that slowly sends an endless banner☆8,438Jun 3, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- A fast TCP/UDP tunnel over HTTP☆15,899Apr 4, 2026Updated 2 weeks ago
- View HTTP/HTTPS requests made by any Linux program☆4,155Dec 23, 2025Updated 3 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,466Updated this week
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,450Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,156Oct 19, 2025Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,421Jan 26, 2026Updated 2 months ago
- Tool for extracting information from newly spawned processes☆778May 11, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,276Updated this week
- Adversary Emulation Framework☆11,023Apr 10, 2026Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,531Updated this week
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,685Jan 5, 2026Updated 3 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated last week
- A Tool for Domain Flyovers☆5,923May 22, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,862Oct 6, 2025Updated 6 months ago
- A collaborative, multi-platform, red teaming framework☆4,409Apr 10, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automagically reverse-engineer REST APIs via capturing traffic☆9,369Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,857Jun 15, 2020Updated 5 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,086Updated this week
- Active Directory information dumper via LDAP☆1,395Apr 6, 2025Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Run PowerShell command without invoking powershell.exe☆1,548Apr 9, 2026Updated last week
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,651Apr 15, 2025Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,588Feb 5, 2026Updated 2 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,530Jan 28, 2026Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆4,004Apr 12, 2026Updated last week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,541Jan 10, 2025Updated last year
- Mimikatz implementation in pure Python☆3,291Apr 9, 2026Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,471Oct 1, 2025Updated 6 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,905Jan 24, 2024Updated 2 years ago