valery-l / udp2tcp_tunnelLinks
UDP to TCP tunnel for sending datagrams through weak network
☆12Updated 12 years ago
Alternatives and similar repositories for udp2tcp_tunnel
Users that are interested in udp2tcp_tunnel are comparing it to the libraries listed below
Sorting:
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- remote linux control☆18Updated 10 years ago
- Linux kernel module netfilter backdoor demo☆8Updated 9 years ago
- 针对PHP网马的正则查杀☆12Updated 7 years ago
- Vipasyin Webshell detector (golang)☆8Updated 10 years ago
- 一个简单的NIDS系统☆15Updated 8 years ago
- linux lcx☆11Updated 8 years ago
- Open Source Web Application Firewall Anti Tamper☆49Updated 11 years ago
- 精简之后的老东西☆34Updated 9 years ago
- 基于行为的Ransomware检测原型☆40Updated 7 years ago
- Tunnel TCP/UDP connections over the Tox protocol .☆11Updated 5 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Updated 6 years ago
- SHIFT后门,适用于windows xp\2003 server\2008 server☆17Updated 11 years ago
- shell over icmp☆31Updated 12 years ago
- Open Source Web Application Firewall Protection Engine☆62Updated 11 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- send dns query packet☆25Updated 4 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Updated 11 years ago
- socks5 proxy simplified from shadowsocks.☆72Updated 11 years ago
- safe_tools☆26Updated 7 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Updated 8 years ago
- ☆16Updated 8 years ago
- 针对邮件协议POP3、SMTP、IMAP进行账户安全性测试☆26Updated 7 years ago
- ☆18Updated 8 years ago
- Automatic detection of security holes☆8Updated 2 years ago
- 一个xss利用平台☆18Updated 11 years ago
- Some POCs or Exploits for vulnerabilities☆12Updated 6 years ago
- 非法域名挖掘与画像系统。☆36Updated 7 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆52Updated 5 years ago