yarrick / iodineLinks
Official git repo for iodine dns tunnel
☆6,447Updated 2 weeks ago
Alternatives and similar repositories for iodine
Users that are interested in iodine are comparing it to the libraries listed below
Sorting:
- ☆3,593Updated last year
- A fast TCP/UDP tunnel over HTTP☆14,560Updated 8 months ago
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,135Updated 3 years ago
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,778Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,241Updated last month
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,566Updated this week
- A tool to dump the login password from the current linux user☆3,953Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,676Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆14,352Updated this week
- An advanced memory forensics framework☆7,700Updated 2 weeks ago
- A little tool to play with Windows security☆20,225Updated 2 weeks ago
- Firmware Analysis Tool☆12,503Updated last month
- Hash collisions and exploitations☆3,201Updated 3 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,083Updated 9 months ago
- an awesome list of honeypot resources☆9,364Updated last month
- Modlishka. Reverse Proxy.☆4,992Updated this week
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,269Updated 3 years ago
- CTF framework and exploit development library☆12,625Updated last month
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,611Updated this week
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,344Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,835Updated last week
- A swiss army knife for pentesting networks☆8,745Updated last year
- Monitor linux processes without root permissions☆5,452Updated 2 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,595Updated this week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,088Updated 2 months ago
- Dirty COW☆3,387Updated 5 years ago
- Weaponized web shell☆3,301Updated 7 months ago
- UNIX-like reverse engineering framework and command-line toolset☆21,707Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,667Updated 7 months ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆14,219Updated last month