drk1wi / portspoofLinks
Portspoof
☆2,386Updated 9 months ago
Alternatives and similar repositories for portspoof
Users that are interested in portspoof are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,757Updated 3 weeks ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,730Updated 3 years ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,638Updated last month
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,356Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,280Updated 2 months ago
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆1,938Updated 3 weeks ago
- SSH-MITM - ssh audits made simple☆1,414Updated 2 weeks ago
- HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.☆1,082Updated last month
- ☆3,722Updated last year
- DarkFlare Firewall Piercing (TCP over CDN)☆1,528Updated 2 weeks ago
- Monitor linux processes without root permissions☆5,730Updated 2 years ago
- Official git repo for iodine dns tunnel☆7,272Updated last month
- Fast Application Layer Scanner☆1,975Updated last week
- DNS Enumeration Script☆2,872Updated this week
- Tunnel TCP connections through a file☆966Updated 2 weeks ago
- Advanced Honeypot framework.☆1,281Updated 2 years ago
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,927Updated last month
- Kippo - SSH Honeypot☆1,702Updated last year
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,729Updated 2 months ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆665Updated 11 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,409Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,082Updated 2 months ago
- SSHamble: Unexpected Exposures in SSH☆1,149Updated last week
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,865Updated last year
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,945Updated this week
- DNSChef - DNS proxy for Penetration Testers and Malware Analysts☆1,011Updated last year
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆682Updated 7 years ago
- Store your data in others DNS resolver cache☆1,046Updated 5 years ago
- Canarytokens helps track activity and actions on your network.☆1,968Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,826Updated 2 weeks ago