Portspoof
☆2,415Feb 11, 2026Updated last month
Alternatives and similar repositories for Portspoof
Users that are interested in Portspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,158Oct 1, 2025Updated 5 months ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆10,560Mar 2, 2026Updated 3 weeks ago
- SSH tarpit that slowly sends an endless banner☆8,426Jun 3, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Impacket is a collection of Python classes for working with network protocols.☆15,576Mar 20, 2026Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,525Apr 17, 2025Updated 11 months ago
- A fast TCP/UDP tunnel over HTTP☆15,809Mar 9, 2026Updated 3 weeks ago
- View HTTP/HTTPS requests made by any Linux program☆4,155Dec 23, 2025Updated 3 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆13,020Mar 11, 2026Updated 2 weeks ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,400Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,393Jan 26, 2026Updated 2 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,246Mar 23, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Adversary Emulation Framework☆10,910Updated this week
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 10 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,467Jun 5, 2025Updated 9 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,664Jan 5, 2026Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,746Updated this week
- A Tool for Domain Flyovers☆5,916May 22, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,778Oct 6, 2025Updated 5 months ago
- A collaborative, multi-platform, red teaming framework☆4,388Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automagically reverse-engineer REST APIs via capturing traffic☆9,273Mar 16, 2026Updated 2 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,850Jun 15, 2020Updated 5 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,002Mar 20, 2026Updated last week
- Active Directory information dumper via LDAP☆1,391Apr 6, 2025Updated 11 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Run PowerShell command without invoking powershell.exe☆1,538Mar 23, 2023Updated 3 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,639Apr 15, 2025Updated 11 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Mar 24, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,567Feb 5, 2026Updated last month
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,449Jan 28, 2026Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,989Feb 20, 2026Updated last month
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,528Jan 10, 2025Updated last year
- Mimikatz implementation in pure Python☆3,263Jan 2, 2026Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,465Oct 1, 2025Updated 5 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,906Jan 24, 2024Updated 2 years ago