hackerschoice / gs-transferLinks
Secure File Transfer via Global Socket Bounce Network
☆24Updated 4 years ago
Alternatives and similar repositories for gs-transfer
Users that are interested in gs-transfer are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Updated 9 years ago
- A "SIP Torture" (RFC 4475) testing framework.☆65Updated 2 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 11 months ago
- Rogue AP killer☆90Updated 7 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Wi-Fi Covert Channel Chat demo application☆71Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago