samyk / pwnatLinks
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofin…
☆3,799Updated 6 months ago
Alternatives and similar repositories for pwnat
Users that are interested in pwnat are comparing it to the libraries listed below
Sorting:
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,656Updated 4 years ago
- Transparent SSL/TLS interception☆1,827Updated 2 weeks ago
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,900Updated last week
- Official git repo for iodine dns tunnel☆7,409Updated 2 months ago
- a VPN daemon☆2,129Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- Single Packet Authorization > Port Knocking☆1,251Updated last year
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,206Updated 3 years ago
- A fast TCP/UDP tunnel over HTTP☆15,222Updated last month
- IP over ICMP☆461Updated last year
- tiny, portable SOCKS5 server with very moderate resource usage☆1,882Updated 8 months ago
- The main freelan repository.☆1,375Updated 2 years ago
- transparent TCP-to-proxy redirector☆3,526Updated last year
- Bidirectional data stream tunnelled in HTTP requests.☆425Updated 2 years ago
- ☆3,738Updated last year
- Encrypted P2P sockets over ZeroTier☆246Updated last year
- A bittorrent filesystem based on FUSE.☆3,928Updated last month
- UPnP IGD implementation☆1,545Updated 2 months ago
- Stealth tunneling through HTTP(S) proxies☆512Updated 5 months ago
- Connect like there is no firewall. Securely.☆1,757Updated last month
- An experiment in scalable routing as an encrypted IPv6 overlay network☆4,265Updated last month
- Peer-to-peer VPN☆1,952Updated last year
- A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.☆2,326Updated 2 months ago
- Firmware Analysis Tool☆13,187Updated 2 months ago
- UDP and TCP NAT hole punching examples in python☆327Updated 6 years ago
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆884Updated 2 years ago
- Multipath UDP tunnel☆730Updated 3 years ago
- An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity☆1,678Updated last year
- An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.☆5,307Updated last month
- Dropbear SSH☆2,052Updated last month