vxfemboy / ghostportView external linksLinks
A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.
☆458Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for ghostport
Users that are interested in ghostport are comparing it to the libraries listed below
Sorting:
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated last month
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆42Jul 19, 2025Updated 6 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- A command line tool to encode text and files into PNG images☆200Dec 1, 2023Updated 2 years ago
- Payload for jpg file☆61Aug 17, 2024Updated last year
- Text Behind Video. Enjoy it is completely free.☆30Feb 15, 2025Updated 11 months ago
- dynamic YAML-driven URL shortener and command mapper with real-time config updates☆20Aug 28, 2025Updated 5 months ago
- 📸 an Instagram tracking script that logs any changes to an Instagram account (followers, following, posts, and bio) written in Python.☆95Nov 18, 2024Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- ☆19Sep 24, 2025Updated 4 months ago
- ☆567Mar 28, 2024Updated last year
- Minimal, web-based system monitor with Docker support, live metrics, alerts, and a built-in file browser—all bundled into a single binary☆148Updated this week
- Cross-platform Search Engine and File Explorer for Multimedia☆31Feb 16, 2025Updated 11 months ago
- An easy and fast way to create a Python GUI 🐍 | This software allows you to create complex UI faster than ever⚡☆178Jan 19, 2025Updated last year
- A shell script for searching for links on torrent sites☆100Sep 26, 2025Updated 4 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆399Sep 26, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 10 months ago
- Autoformatted file layout using sections (imports, constants, classes, functions).☆62Sep 5, 2024Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 3 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Apr 21, 2024Updated last year
- A tool for plotting processes accessing the network☆91Jul 1, 2022Updated 3 years ago
- Embed a payload inside a PNG file☆368Oct 24, 2024Updated last year
- A Linux CLI tool for physical and network drive information☆66Dec 6, 2025Updated 2 months ago
- A bash script to perform routine maintenance and cleanup tasks on Arch Linux systems.☆54Oct 31, 2025Updated 3 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- Password management through LSB image steganography.☆50Jan 10, 2025Updated last year
- Windows Kernel Rootkit in Rust☆679Oct 10, 2025Updated 4 months ago
- Go implementation of noisy HTTP/DNS traffic generator☆178Oct 29, 2025Updated 3 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- Swap your face in real-time☆74Mar 25, 2025Updated 10 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- Convolutional Neural Network that classifies voice clips as human or AI with 94% accuracy.☆74Jun 18, 2025Updated 7 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Feb 17, 2023Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- A interactive notebook for the terminal☆32Nov 12, 2024Updated last year
- 🧸 fully isolated honeypot ssh server using thrussh☆278Nov 19, 2024Updated last year