drk1wi / portspoof
Portspoof
☆2,321Updated 3 months ago
Alternatives and similar repositories for portspoof:
Users that are interested in portspoof are comparing it to the libraries listed below
- Connect like there is no firewall. Securely.☆1,667Updated 3 weeks ago
- DNS Enumeration Script☆2,750Updated last week
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,694Updated 3 years ago
- Monitor linux processes without root permissions☆5,360Updated 2 years ago
- Fast Application Layer Scanner☆1,849Updated this week
- SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆3,623Updated 4 months ago
- DarkFlare Firewall Piercing (TCP over CDN)☆1,279Updated 3 months ago
- An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity☆1,625Updated 5 months ago
- Certificate Transparency Log Monitor☆1,036Updated 3 months ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,320Updated 2 months ago
- Fast DNS Lookup Library and CLI Tool☆984Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,675Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,258Updated 5 months ago
- ☆3,559Updated last year
- NSE script based on Vulners.com API☆3,292Updated last year
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,101Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,297Updated 3 months ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,736Updated 3 weeks ago
- Official git repo for iodine dns tunnel☆6,406Updated last week
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,455Updated 2 years ago
- Data exfiltration over DNS request covert channel☆866Updated 11 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,106Updated this week
- Nikto web server scanner☆9,145Updated last month
- Weaponized web shell☆3,289Updated 6 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,590Updated 7 months ago
- Adversary Emulation Framework☆9,183Updated this week
- Hash collisions and exploitations☆3,169Updated last month
- 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.☆2,706Updated 10 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,251Updated 9 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,217Updated this week