pathes / fakednsLinks
Fake DNS server written in python 3
☆86Updated 3 years ago
Alternatives and similar repositories for fakedns
Users that are interested in fakedns are comparing it to the libraries listed below
Sorting:
- Intercepting TCP proxy to modify raw TCP streams using modules on incoming or outgoing traffic☆308Updated last year
- Simple TCP proxy. Allows you to intercept/inspect TCP traffic.☆109Updated last year
- This is a tcpdump-like program for printing TLS SNI and HTTP/1.1 Host fields in live or captured traffic.☆112Updated last year
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆105Updated 9 years ago
- export mitmproxy traffic to PCAP file☆57Updated last year
- Grab ssh keys from ssh-agent☆222Updated 5 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- ☆380Updated 12 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- File transfer via DNS☆72Updated 8 years ago
- Mirror of http://silicone.homelinux.org/git/netsed.git/☆63Updated 8 years ago
- DNS Reverse Proxy☆189Updated 3 months ago
- The most small and fast solution to create a undetectable backdoor through the PAM module.☆44Updated 7 years ago
- Simple development DNS server written in python☆163Updated last year
- A regular-expression based python MITM DNS server with support for DNS Rebinding attacks☆570Updated 3 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 9 months ago
- tunneling software over DNS: Java server, GUI and command-line clients for Android, Windows, Mac OS X & Unix/Linux☆81Updated 2 years ago
- Check if your VPN leaks your IP address via the WebRTC technology☆184Updated 7 years ago
- Poor mans VPN over SSH☆134Updated 2 years ago
- Openssh backdoor found with a ssh honeypot☆28Updated 9 years ago
- Raw-packet Project☆230Updated 5 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- ☆36Updated 7 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago
- a collection of writeups and tools related to ~embedded device ~hacking☆143Updated 7 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆212Updated 4 months ago
- Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.☆87Updated 5 years ago
- Netfilter NFQUEUE high-level bindings☆41Updated 6 years ago
- ☆72Updated 6 years ago
- The source code of https://requestbin.net☆176Updated 2 years ago