firefart / stunnerLinks
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
☆833Updated 2 weeks ago
Alternatives and similar repositories for stunner
Users that are interested in stunner are comparing it to the libraries listed below
Sorting:
- Credentials Dumper for Linux using eBPF☆1,156Updated last year
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,050Updated 3 weeks ago
- SSH-MITM - ssh audits made simple☆1,422Updated 2 weeks ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,040Updated last week
- A crossplatform mDNS enumeration tool.☆362Updated 3 years ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,010Updated 2 years ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,172Updated last week
- Fast HTTP enumerator☆493Updated 8 months ago
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆666Updated 3 years ago
- Overlay networks based on WebRTC.☆1,953Updated 8 months ago
- Connect like there is no firewall. Securely.☆1,786Updated last month
- Go alternative of python SimpleHTTPServer☆524Updated last week
- SSH based reverse shell☆1,298Updated 3 weeks ago
- Private key usage verification☆432Updated 8 months ago
- Stream video from ffmpeg to web(rtc)☆975Updated 2 months ago
- An intentionally vulnerable NGINX setup☆243Updated 5 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆404Updated 11 months ago
- A utility to detect various technology for a given IP address.☆913Updated this week
- SSH over QUIC☆841Updated last week
- OXO is a security scanning orchestrator for the modern age.☆559Updated this week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆709Updated last week
- ☆414Updated 3 weeks ago
- A tool for IDN homograph attacks and detection.☆740Updated 4 years ago
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆978Updated last week
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Standalone utility for service discovery on open ports!☆667Updated 9 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆689Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,653Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,240Updated 2 weeks ago