robertklep / node-port-muxLinks
TCP port multiplexer: run multiple services through the same port
☆15Updated 12 years ago
Alternatives and similar repositories for node-port-mux
Users that are interested in node-port-mux are comparing it to the libraries listed below
Sorting:
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Jar Protector - Jar Crypter☆14Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- A web application for running shell commands interactively on your server☆21Updated 8 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Updated 10 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 9 years ago
- all things awesome security☆14Updated 9 years ago
- DHCP attack tool☆21Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- ☆33Updated 10 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆13Updated last year
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Updated 2 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆20Updated last year
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Burp Extender to add unique form tokens to scanner requests.☆14Updated 11 months ago
- IPSec testing tool☆19Updated last year