drk1wi / portspoofView external linksLinks
Portspoof
☆2,406Dec 14, 2025Updated 2 months ago
Alternatives and similar repositories for portspoof
Users that are interested in portspoof are comparing it to the libraries listed below
Sorting:
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,091Oct 1, 2025Updated 4 months ago
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆10,537Aug 1, 2025Updated 6 months ago
- A fast TCP/UDP tunnel over HTTP☆15,571Sep 14, 2025Updated 5 months ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,875Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,319Jan 26, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,448Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,503Apr 17, 2025Updated 9 months ago
- View HTTP/HTTPS requests made by any Linux program☆4,144Dec 23, 2025Updated last month
- SSH tarpit that slowly sends an endless banner☆8,406Jun 3, 2024Updated last year
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 9 months ago
- Adversary Emulation Framework☆10,673Feb 8, 2026Updated last week
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,297Feb 5, 2026Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,305Jun 5, 2025Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- Automagically reverse-engineer REST APIs via capturing traffic☆9,235Jan 19, 2026Updated 3 weeks ago
- A tool to abuse Exchange services☆2,297Jun 10, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Oct 19, 2025Updated 3 months ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,903Nov 19, 2025Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,816Dec 31, 2025Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- Run PowerShell command without invoking powershell.exe☆1,530Mar 23, 2023Updated 2 years ago
- Mimikatz implementation in pure Python☆3,239Jan 2, 2026Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,236Jan 28, 2026Updated 2 weeks ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 10 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,717Feb 6, 2026Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- A collaborative, multi-platform, red teaming framework☆4,296Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆26,985Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,165Updated this week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,109Mar 12, 2024Updated last year
- Find, verify, and analyze leaked credentials☆24,487Feb 7, 2026Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Jun 15, 2020Updated 5 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,515Feb 5, 2026Updated last week