vxfemboy / ghostportLinks
A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.
☆424Updated 7 months ago
Alternatives and similar repositories for ghostport
Users that are interested in ghostport are comparing it to the libraries listed below
Sorting:
- Modern web-based distributed hashcracking solution, built on hashcat☆138Updated 2 weeks ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆272Updated 11 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆286Updated 2 years ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆87Updated last week
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆150Updated 10 months ago
- ☆543Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆127Updated last year
- A monster cheatsheet on MITM attacks☆353Updated 2 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆266Updated 6 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆388Updated 8 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆203Updated 4 months ago
- Network Security Sniffer☆790Updated last month
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆20Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆304Updated last week
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆92Updated last year
- Collection of forensic tools☆634Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆88Updated 6 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆265Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- Light-weight web security scanner☆150Updated 2 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆147Updated 2 weeks ago
- Payload for jpg file☆64Updated 9 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- ☆344Updated 2 years ago
- A command line tool to encode text and files into PNG images☆177Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆302Updated 8 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆200Updated 2 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆182Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆513Updated 9 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆652Updated 2 months ago