vxfemboy / ghostportLinks
A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.
☆436Updated 2 weeks ago
Alternatives and similar repositories for ghostport
Users that are interested in ghostport are comparing it to the libraries listed below
Sorting:
- Modern web-based distributed hashcracking solution, built on hashcat☆145Updated this week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- Light-weight web security scanner☆151Updated 7 months ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆159Updated last year
- A monster cheatsheet on MITM attacks☆365Updated 4 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆137Updated last year
- 🧸 fully isolated honeypot ssh server using thrussh☆269Updated 10 months ago
- A command line tool to encode text and files into PNG images☆182Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆99Updated 4 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated 10 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆163Updated this week
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆326Updated 2 years ago
- Payload for jpg file☆65Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- 0up is a zero-knowledge, open-source, encrypted file sharing service☆125Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆99Updated last year
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆28Updated 6 months ago
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆335Updated 8 months ago
- Reverse proxies cheatsheet☆26Updated last year
- Network Security Sniffer☆821Updated 2 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆209Updated 6 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated 5 months ago
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆542Updated last week
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆117Updated 9 months ago
- QR code splitting☆139Updated 2 years ago
- ☆564Updated last year
- The DNA test for websites☆74Updated 3 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Updated 2 years ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆51Updated 2 months ago
- Maltego Transforms for OSINT on Telegram Messenger☆366Updated last month