yarrick / iodine
Official git repo for iodine dns tunnel
☆6,245Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for iodine
- ☆3,454Updated 8 months ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,204Updated 3 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆10,938Updated 2 weeks ago
- A fast TCP/UDP tunnel over HTTP☆13,624Updated last month
- A tool to dump the login password from the current linux user☆3,818Updated last year
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,100Updated 2 years ago
- Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io☆5,206Updated this week
- Connect like there is no firewall. Securely.☆1,535Updated last week
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆3,940Updated 3 months ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,361Updated 2 years ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆13,476Updated 2 weeks ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,689Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,525Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13,557Updated 3 weeks ago
- an awesome list of honeypot resources☆8,649Updated 3 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆23,716Updated 3 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆16,791Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,487Updated 2 weeks ago
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆11,797Updated 3 weeks ago
- Credentials recovery project☆9,595Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,462Updated 7 months ago
- Exploitation Framework for Embedded Devices☆12,215Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,472Updated last month
- A terminal UI for tshark, inspired by Wireshark☆9,125Updated 6 months ago
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,592Updated 3 years ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,538Updated last week
- LKM Linux rootkit☆2,612Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,613Updated this week
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,696Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,084Updated last month