firefart / stunnerLinks
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
☆805Updated this week
Alternatives and similar repositories for stunner
Users that are interested in stunner are comparing it to the libraries listed below
Sorting:
- Credentials Dumper for Linux using eBPF☆1,144Updated 10 months ago
- SSH-MITM - ssh audits made simple☆1,392Updated last month
- Fast and configurable TLS grabber focused on TLS based data collection.☆985Updated last week
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆963Updated 2 weeks ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,113Updated this week
- Go alternative of python SimpleHTTPServer☆517Updated last year
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆988Updated 2 years ago
- Fast HTTP enumerator☆484Updated 2 months ago
- OXO is a security scanning orchestrator for the modern age.☆552Updated last week
- A crossplatform mDNS enumeration tool.☆354Updated 2 years ago
- SSH based reverse shell☆1,147Updated last month
- Connect like there is no firewall. Securely.☆1,708Updated 2 weeks ago
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆884Updated last week
- A utility to detect various technology for a given IP address.☆850Updated this week
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆399Updated 5 months ago
- Scrape domain names from SSL certificates of arbitrary hosts☆653Updated last year
- ☆392Updated 2 weeks ago
- Scan memory for secrets and more. Maybe eventually a full /proc toolkit.☆657Updated 2 years ago
- SSH over QUIC☆824Updated last week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆686Updated 3 months ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- Private key usage verification☆430Updated 3 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,158Updated last week
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 3 years ago
- "Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.☆1,039Updated 4 months ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Set of tools to audit SIP based VoIP Systems☆507Updated this week
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆422Updated 8 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆988Updated last month
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,628Updated last year