yarrick / iodineLinks
Official git repo for iodine dns tunnel
☆6,537Updated last month
Alternatives and similar repositories for iodine
Users that are interested in iodine are comparing it to the libraries listed below
Sorting:
- ☆3,620Updated last year
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,802Updated 2 weeks ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,607Updated 3 weeks ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,162Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,276Updated 3 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,286Updated 2 months ago
- A tool to dump the login password from the current linux user☆3,969Updated 2 years ago
- A fast TCP/UDP tunnel over HTTP☆14,706Updated 9 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,674Updated last week
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,422Updated 2 months ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,819Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,701Updated 5 years ago
- Credentials recovery project☆10,189Updated last month
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,966Updated last year
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,977Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,750Updated last year
- Monitor linux processes without root permissions☆5,523Updated 2 years ago
- The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,602Updated 2 months ago
- Reconnaissance tool for GitHub organizations☆6,043Updated 2 years ago
- Kippo - SSH Honeypot☆1,695Updated last year
- Exploitation Framework for Embedded Devices☆12,627Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,884Updated last month
- Nikto web server scanner☆9,402Updated this week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,098Updated 3 months ago
- Malicious traffic detection system☆7,058Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,758Updated last month
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,441Updated 3 years ago
- UNIX-like reverse engineering framework and command-line toolset☆21,876Updated this week
- Six Degrees of Domain Admin☆10,232Updated 2 weeks ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,300Updated last year