A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.
☆462Dec 12, 2025Updated 4 months ago
Alternatives and similar repositories for ghostport
Users that are interested in ghostport are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A experimental cli tool to encrypt & decrypt files/directories.☆35Dec 30, 2025Updated 3 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Text Behind Video. Enjoy it is completely free.☆30Feb 15, 2025Updated last year
- A command line tool to encode text and files into PNG images☆205Dec 1, 2023Updated 2 years ago
- Payload for jpg file☆60Aug 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆41Jul 19, 2025Updated 8 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- ☆570Mar 28, 2024Updated 2 years ago
- 📸 an Instagram tracking script that logs any changes to an Instagram account (followers, following, posts, and bio) written in Python.☆101Nov 18, 2024Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆105Nov 2, 2025Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A bash script to perform routine maintenance and cleanup tasks on Arch Linux systems.☆62Oct 31, 2025Updated 5 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆409Sep 26, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Embed a payload inside a PNG file☆372Oct 24, 2024Updated last year
- Minimal, web-based system monitor with Docker support, live metrics, alerts, and a built-in file browser—all bundled into a single binary☆153Feb 10, 2026Updated 2 months ago
- Autoformatted file layout using sections (imports, constants, classes, functions).☆62Sep 5, 2024Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Feb 17, 2023Updated 3 years ago
- A interactive notebook for the terminal☆32Nov 12, 2024Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Jan 15, 2024Updated 2 years ago
- Password management through LSB image steganography.☆50Jan 10, 2025Updated last year
- dynamic YAML-driven URL shortener and command mapper with real-time config updates☆20Aug 28, 2025Updated 7 months ago
- ☄️ A cross-platform desktop app powered by FFmpeg for easy, beautiful media conversion.☆153Nov 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆23Mar 4, 2025Updated last year
- Windows Kernel Rootkit in Rust☆683Oct 10, 2025Updated 6 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆279Nov 19, 2024Updated last year
- DebianDog, Mintpup, XenialDog website☆39Jul 21, 2025Updated 8 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆132Mar 26, 2025Updated last year
- An easy and fast way to create a Python GUI 🐍 | This software allows you to create complex UI faster than ever⚡☆180Jan 19, 2025Updated last year
- Cross-platform Search Engine and File Explorer for Multimedia☆31Feb 16, 2025Updated last year
- ☆20Sep 24, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A tool for plotting processes accessing the network☆91Jul 1, 2022Updated 3 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- A shell script for searching for links on torrent sites☆101Sep 26, 2025Updated 6 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated last year
- Generate a proxy dll for arbitrary dll☆227Oct 19, 2024Updated last year
- unformat code into perfect blocks☆74Apr 10, 2024Updated 2 years ago