The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofin…
☆3,866Dec 26, 2025Updated 2 months ago
Alternatives and similar repositories for pwnat
Users that are interested in pwnat are comparing it to the libraries listed below
Sorting:
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,965Jan 14, 2023Updated 3 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,259Jan 11, 2017Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,445Nov 26, 2018Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,092Jul 3, 2022Updated 3 years ago
- A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless o…☆1,801Nov 21, 2017Updated 8 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆613Jul 30, 2025Updated 7 months ago
- NAT Pinning exploit tool for penetration testers.☆34Jan 20, 2014Updated 12 years ago
- A fast TCP/UDP tunnel over HTTP☆15,684Feb 15, 2026Updated 2 weeks ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Updated this week
- Digital Ding Dong Ditch -- RTL-SDR + Arduino + GSM/SMS/FONA + RF + GQRX to hack a wireless doorbell from a text message☆249Jul 17, 2021Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,375Jun 5, 2025Updated 8 months ago
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆5,009Feb 15, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- A Smart Ethernet Switch for Earth☆16,497Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,170Updated this week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- Official git repo for iodine dns tunnel☆7,668Sep 4, 2025Updated 6 months ago
- A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable U…☆8,358Oct 12, 2025Updated 4 months ago
- ☆3,839Mar 14, 2024Updated last year
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,120Mar 2, 2017Updated 9 years ago
- Firmware Analysis Tool☆13,621Feb 5, 2026Updated 3 weeks ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- travel across kinds of NATs, including symmetric NATs☆271Jul 4, 2019Updated 6 years ago
- A Swiss army knife for your daily Linux network plumbing.☆1,398Jun 11, 2025Updated 8 months ago
- An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.☆42,431Feb 11, 2026Updated 3 weeks ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆45Sep 27, 2015Updated 10 years ago
- A scalable overlay networking tool with a focus on performance, simplicity and security☆17,065Updated this week
- CTF framework and exploit development library☆13,293Updated this week
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- Software, firmware and hardware designs for Ubertooth☆19Aug 30, 2015Updated 10 years ago
- Userspace WireGuard® Implementation in Rust☆6,915Jan 22, 2026Updated last month
- ☆50Feb 23, 2017Updated 9 years ago
- a VPN daemon☆2,175Nov 9, 2025Updated 3 months ago
- List of great p2p resources☆31Dec 28, 2016Updated 9 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Jul 30, 2015Updated 10 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago