vxfemboy / ghostport
A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.
☆384Updated 3 months ago
Alternatives and similar repositories for ghostport:
Users that are interested in ghostport are comparing it to the libraries listed below
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆262Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆114Updated last week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated 7 months ago
- ☆520Updated 10 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆78Updated 2 months ago
- Invisible network protocol sniffer☆750Updated 5 months ago
- Light-weight web security scanner☆151Updated last year
- A monster cheatsheet on MITM attacks☆324Updated 11 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆123Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆507Updated 3 weeks ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆261Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆314Updated 4 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆207Updated 2 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆264Updated 2 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆81Updated 9 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆136Updated this week
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆110Updated 6 months ago
- Payload for jpg file☆62Updated 5 months ago
- The DNA test for websites☆62Updated 2 months ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆315Updated 10 months ago
- A command line tool to encode text and files into PNG images☆174Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆173Updated 2 years ago
- Tool for hiding Kali Linux on the network☆307Updated 8 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆239Updated 4 months ago
- WiFi Penetration Testing & Auditing Tool☆454Updated this week
- 0up is a zero-knowledge, open-source, encrypted file sharing service☆116Updated 10 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆230Updated last week
- RouterOS Security Inspector☆173Updated last month
- Python-based Hashcat wrapper for easy decryption.☆168Updated this week
- 📡 802.11 broadcast analyzer & injector☆135Updated last month