A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.
☆690Oct 19, 2018Updated 7 years ago
Alternatives and similar repositories for knockknock
Users that are interested in knockknock are comparing it to the libraries listed below
Sorting:
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆570Dec 17, 2017Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Sep 8, 2015Updated 10 years ago
- ☆383Sep 22, 2012Updated 13 years ago
- An agile, distributed, and secure alternative to the Certificate Authority system.☆635Mar 7, 2012Updated 14 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,039May 29, 2021Updated 4 years ago
- Single Packet Authorization > Port Knocking☆1,322Nov 26, 2025Updated 3 months ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Sustainable shellcode evasion☆113Updated this week
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆115Apr 16, 2016Updated 9 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,995Mar 11, 2026Updated last week
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆709Nov 6, 2016Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,846Jun 15, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆761Jan 28, 2019Updated 7 years ago
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆894Jun 22, 2023Updated 2 years ago
- Code, mechanical designs, and electronic plans related to the OpenSpectrometer project.☆28Jul 1, 2014Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Jan 8, 2023Updated 3 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago