firefart / stunnerLinks
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
☆835Updated 3 weeks ago
Alternatives and similar repositories for stunner
Users that are interested in stunner are comparing it to the libraries listed below
Sorting:
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,064Updated last week
- Credentials Dumper for Linux using eBPF☆1,157Updated last year
- SSH-MITM - ssh audits made simple☆1,428Updated 2 weeks ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,026Updated 2 years ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,070Updated last week
- A crossplatform mDNS enumeration tool.☆363Updated 3 years ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,182Updated last week
- Fast HTTP enumerator☆493Updated 9 months ago
- Connect like there is no firewall. Securely.☆1,804Updated 2 months ago
- Go alternative of python SimpleHTTPServer☆530Updated last week
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆671Updated 3 years ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆721Updated last month
- OXO is a security scanning orchestrator for the modern age.☆560Updated this week
- SSH over QUIC☆845Updated this week
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Updated last year
- Private key usage verification☆432Updated 10 months ago
- An intentionally vulnerable NGINX setup☆245Updated 5 years ago
- Scrape domain names from SSL certificates of arbitrary hosts☆689Updated last year
- SSH based reverse shell☆1,319Updated 2 weeks ago
- Reverse Tunnels in Go over HTTP/3 and QUIC☆986Updated last month
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Updated 3 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆194Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆534Updated 4 years ago
- Stream video from ffmpeg to web(rtc)☆977Updated 4 months ago
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆996Updated 2 weeks ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Updated 2 months ago
- Overlay networks based on WebRTC.☆1,973Updated 9 months ago
- A tool for IDN homograph attacks and detection.☆741Updated 5 years ago
- ☆561Updated 10 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,961Updated 3 years ago