yarrick / iodineLinks
Official git repo for iodine dns tunnel
☆7,404Updated last month
Alternatives and similar repositories for iodine
Users that are interested in iodine are comparing it to the libraries listed below
Sorting:
- ☆3,727Updated last year
 - Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,900Updated this week
 - Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,204Updated 3 years ago
 - ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,965Updated 3 weeks ago
 - OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆12,307Updated last month
 - The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,797Updated 6 months ago
 - A fast TCP/UDP tunnel over HTTP☆15,205Updated last month
 - Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,954Updated this week
 - Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,653Updated 4 years ago
 - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,802Updated last week
 - DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,731Updated 3 years ago
 - Firmware Analysis Tool☆13,144Updated 2 months ago
 - A little tool to play with Windows security☆20,929Updated 5 months ago
 - SSH tarpit that slowly sends an endless banner☆8,329Updated last year
 - The pattern matching swiss knife☆9,177Updated this week
 - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,998Updated 4 months ago
 - Connect like there is no firewall. Securely.☆1,757Updated last month
 - An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity☆1,678Updated last year
 - Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,161Updated last year
 - SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,985Updated last year
 - An advanced memory forensics framework☆7,864Updated 5 months ago
 - Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,289Updated 4 years ago
 - A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kaf…☆3,540Updated 2 weeks ago
 - A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,468Updated 3 years ago
 - Portspoof☆2,384Updated 10 months ago
 - CTF framework and exploit development library☆13,004Updated last week
 - Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,778Updated 5 years ago
 - A tool to dump the login password from the current linux user☆4,032Updated last month
 - Transparent SSL/TLS interception☆1,827Updated last week
 - Fast Application Layer Scanner☆1,981Updated this week