yarrick / iodineLinks
Official git repo for iodine dns tunnel
☆7,439Updated 2 months ago
Alternatives and similar repositories for iodine
Users that are interested in iodine are comparing it to the libraries listed below
Sorting:
- Transparently tunnel your IP traffic through ICMP echo and reply packets.☆3,213Updated 3 years ago
- ☆3,754Updated last year
- Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)☆4,912Updated last week
- A fast TCP/UDP tunnel over HTTP☆15,261Updated 2 months ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,997Updated last week
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,657Updated 4 years ago
- Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Suppor…☆12,857Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,089Updated 5 months ago
- SQL powered operating system instrumentation, monitoring, and analytics.☆22,895Updated this week
- proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, S…☆7,545Updated last year
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,972Updated last week
- Transparent SSL/TLS interception☆1,829Updated 3 weeks ago
- The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd…☆3,808Updated 6 months ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,013Updated 4 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,419Updated 7 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,453Updated 3 weeks ago
- Fast Application Layer Scanner☆1,995Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,785Updated 5 years ago
- Connect like there is no firewall. Securely.☆1,761Updated last month
- Weaponized web shell☆3,416Updated last month
- Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available☆5,975Updated last week
- A tool to dump the login password from the current linux user☆4,046Updated 2 months ago
- dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.☆12,651Updated this week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,951Updated 2 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,300Updated 2 months ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,294Updated 4 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,176Updated last year
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,985Updated last year
- Portspoof☆2,391Updated 10 months ago
- NSE script based on Vulners.com API☆3,358Updated last month