yarrick / iodine
Official git repo for iodine dns tunnel
☆6,425Updated last month
Alternatives and similar repositories for iodine:
Users that are interested in iodine are comparing it to the libraries listed below
- ☆3,578Updated last year
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,133Updated 3 years ago
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,760Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,426Updated 4 months ago
- A fast TCP/UDP tunnel over HTTP☆14,477Updated 7 months ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,756Updated last week
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,622Updated 3 years ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆14,142Updated last month
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,427Updated 3 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,549Updated this week
- Transparent SSL/TLS interception☆1,794Updated 7 months ago
- A tool to dump the login password from the current linux user☆3,943Updated last year
- proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, S…☆7,171Updated 11 months ago
- A terminal UI for tshark, inspired by Wireshark☆9,387Updated last year
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,288Updated 2 weeks ago
- A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kaf…☆3,208Updated this week
- Firmware Analysis Tool☆12,423Updated 3 weeks ago
- Connect like there is no firewall. Securely.☆1,680Updated 2 weeks ago
- 📖 Unofficial WireGuard Documentation: Setup, Usage, Configuration, and full example setups for VPNs supporting both servers & roaming cl…☆4,811Updated last month
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,266Updated 3 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,695Updated 3 years ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,526Updated this week
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,516Updated last year
- Exploitation Framework for Embedded Devices☆12,525Updated 2 weeks ago
- Various *nix tools built as statically-linked binaries☆3,347Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,799Updated last month
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,678Updated 8 months ago
- The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,559Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,660Updated 4 years ago
- Monitor linux processes without root permissions☆5,407Updated 2 years ago