moxie0 / knockknockView external linksLinks
A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.
☆688Oct 19, 2018Updated 7 years ago
Alternatives and similar repositories for knockknock
Users that are interested in knockknock are comparing it to the libraries listed below
Sorting:
- A tool (and library) for TACKs☆30Jun 15, 2017Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆147Sep 8, 2015Updated 10 years ago
- ☆384Sep 22, 2012Updated 13 years ago
- An agile, distributed, and secure alternative to the Certificate Authority system.☆634Mar 7, 2012Updated 13 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,030May 29, 2021Updated 4 years ago
- Single Packet Authorization > Port Knocking☆1,303Nov 26, 2025Updated 2 months ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆840Jun 25, 2024Updated last year
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Aug 8, 2021Updated 4 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Feb 3, 2022Updated 4 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,875Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Jun 15, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆555Updated this week
- ☆210Jan 30, 2019Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆893Jun 22, 2023Updated 2 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Oct 11, 2022Updated 3 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆131Nov 10, 2023Updated 2 years ago