yarrick / iodineLinks
Official git repo for iodine dns tunnel
☆6,575Updated 2 months ago
Alternatives and similar repositories for iodine
Users that are interested in iodine are comparing it to the libraries listed below
Sorting:
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,844Updated this week
- ☆3,645Updated last year
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,823Updated 3 weeks ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,171Updated 3 years ago
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,637Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,659Updated last month
- A fast TCP/UDP tunnel over HTTP☆14,804Updated 9 months ago
- A tool to dump the login password from the current linux user☆3,980Updated 2 years ago
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,501Updated 2 months ago
- Transparent SSL/TLS interception☆1,806Updated 10 months ago
- Stores your data in ICMP ping packets☆3,168Updated last year
- Connect like there is no firewall. Securely.☆1,711Updated 3 weeks ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,450Updated 3 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,275Updated 3 years ago
- An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity☆1,654Updated 9 months ago
- Malicious traffic detection system☆7,093Updated this week
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,721Updated last week
- Exploitation Framework for Embedded Devices☆12,666Updated last month
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,703Updated 3 years ago
- SSH man-in-the-middle tool☆1,673Updated 4 years ago
- Dirty COW☆3,399Updated 5 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,930Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,948Updated last year
- The pattern matching swiss knife☆8,932Updated last month
- A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kaf…☆3,408Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,721Updated 5 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,315Updated 3 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,763Updated this week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,758Updated 2 months ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,264Updated 11 months ago