valery-l / udp2tcp_tunnelLinks
UDP to TCP tunnel for sending datagrams through weak network
☆12Updated 12 years ago
Alternatives and similar repositories for udp2tcp_tunnel
Users that are interested in udp2tcp_tunnel are comparing it to the libraries listed below
Sorting:
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- remote linux control☆19Updated 10 years ago
- 国内第二套开源的资产管理系统,适合于对多个站点进行扫描☆18Updated 8 years ago
- send dns query packet☆26Updated 4 years ago
- wifi万能钥匙api☆59Updated 9 years ago
- ☆10Updated 10 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆42Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- 针对邮件协议POP3、SMTP、IMAP进行账户安全性测试☆26Updated 7 years ago
- 在任何地方通过网页控制和管理自己的计算设备☆47Updated 12 years ago
- Outlook addin Back Door☆11Updated 10 years ago
- DNS log http://zone.wooyun.org/content/27119☆21Updated 9 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆18Updated 10 years ago
- shell over icmp☆33Updated 12 years ago
- 针对PHP网马的正则查杀☆12Updated 7 years ago
- Open Source Web Application Firewall Protection Engine☆62Updated 12 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Updated 9 years ago
- simple http(s) proxy with python based sqlmapapi wrapper☆10Updated 10 years ago
- 基于行为的Ransomware检测原型☆40Updated 8 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆54Updated 11 years ago
- The Xss Platform☆16Updated 9 years ago
- socks5 proxy simplified from shadowsocks.☆71Updated 12 years ago
- ☆13Updated 11 years ago
- 一个基于lua插件的pcap监控工具。☆27Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆27Updated 4 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆52Updated 6 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆21Updated 12 years ago
- Open Source Web Application Firewall Anti Tamper☆49Updated 12 years ago
- Hades-lite 青松云安全开源的一个内核级 Anti-ddos 的驱动程序,轻量且高效,构建高性能代理防御,单机可抵御7Gb DDoS攻击☆97Updated 6 years ago