VmeshVMesh is a decentralized Layer 3 mesh router and protocol designed for open network interconnection.
Stars: ✭ 25 (-68.35%)
Vue D3 NetworkVue component to graph networks using d3-force
Stars: ✭ 415 (+425.32%)
PytcpPyTCP is an attempt to create fully functional TCP/IP stack in Python. It supports TCP stream based transport with reliable packet delivery based on sliding window mechanism and basic congestion control. It also supports IPv6/ICMPv6 protocols with SLAAC address configuration. It operates as user space program attached to Linux TAP interface. As of today stack is able to send and receive traffic over Internet using IPv4 and IPv6 default gateways for routing. Since goal of this project is purely educational (at least at this point) the clarity of code is preferred over its efficiency. For the same reason security features are not being implemented just yet unless they are integral part of TCP/IP suite protocols specification.
Stars: ✭ 65 (-17.72%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+422.78%)
HpnlHigh Performance Network Library for RDMA
Stars: ✭ 23 (-70.89%)
Hp SocketHigh Performance TCP/UDP/HTTP Communication Component
Stars: ✭ 4,420 (+5494.94%)
Rats SearchBitTorrent P2P multi-platform search engine for Desktop and Web servers with integrated torrent client.
Stars: ✭ 1,037 (+1212.66%)
GcpingMeasure your latency to GCP regions
Stars: ✭ 405 (+412.66%)
HomeboxA Toolbox for Home Local Networks
Stars: ✭ 78 (-1.27%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+7716.46%)
SsfSecure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platform
Stars: ✭ 1,157 (+1364.56%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-30.38%)
NtopngWeb-based Traffic and Security Network Traffic Monitoring
Stars: ✭ 4,313 (+5359.49%)
NaivecnnA naive (very simple!) implementation of a convolutional neural network
Stars: ✭ 18 (-77.22%)
Httplib2Small, fast HTTP client library for Python. Features persistent connections, cache, and Google App Engine support. Originally written by Joe Gregorio, now supported by community.
Stars: ✭ 402 (+408.86%)
Pcwt Stars: ✭ 46 (-41.77%)
GdogA fully featured Windows backdoor that uses Gmail as a C&C server
Stars: ✭ 399 (+405.06%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1035.44%)
Bagela little native network debugging tool for iOS
Stars: ✭ 4,005 (+4969.62%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1332.91%)
Jsql InjectionjSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+1027.85%)
NipeAn engine to make Tor network your default gateway
Stars: ✭ 1,032 (+1206.33%)
P2pPractice project to demonstrate p2p file sharing.
Stars: ✭ 16 (-79.75%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+383.54%)
Tinybirdnet UnityA high level API for making networked games in Unity, utilizes https://github.com/RevenantX/LiteNetLib
Stars: ✭ 72 (-8.86%)
CerasUniversal binary serializer for a wide variety of scenarios https://discord.gg/FGaCX4c
Stars: ✭ 374 (+373.42%)
SpookflareLoader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
Stars: ✭ 836 (+958.23%)
Sandwich🥪 A lightweight and standardized Android network response interface for handling successful data and error responses.
Stars: ✭ 370 (+368.35%)
Oh My Request🔮 simple request library by java8
Stars: ✭ 44 (-44.3%)
BgpalerterSoftware to monitor streams of BGP data. Pre-configured for real-time detection of visibility loss, RPKI invalid announcements, hijacks, and more.
Stars: ✭ 367 (+364.56%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+9044.3%)
PolymorphPolymorph is a real-time network packet manipulation framework with support for almost all existing protocols
Stars: ✭ 364 (+360.76%)
MthawkeyeProfiling / Debugging assist tools for iOS. (Memory Leak, OOM, ANR, Hard Stalling, Network, OpenGL, Time Profile ...)
Stars: ✭ 1,119 (+1316.46%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+925.32%)
AplayA Better(Maybe) iOS Audio Stream、Cache、Play Framework
Stars: ✭ 44 (-44.3%)
SoftwareDeepValueNetwork is a peer-to-peer database network managed and hosted by its community. It contains a browser to render 2D/3D content and allow the creation of scripted applications built on top of the p2p database network and managed by its creators, without intermediary platform.
Stars: ✭ 357 (+351.9%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+9712.66%)
YarpYARP - Yet Another Robot Platform
Stars: ✭ 358 (+353.16%)
Objection📱 objection - runtime mobile exploration
Stars: ✭ 4,404 (+5474.68%)
EventdA simple daemon to track remote or local events and do actions the user wants to
Stars: ✭ 43 (-45.57%)
Dnsbrutea fast domain brute tool
Stars: ✭ 352 (+345.57%)
Flannelflannel is a network fabric for containers, designed for Kubernetes
Stars: ✭ 6,905 (+8640.51%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (+336.71%)
CollieAn asynchronous event-driven network framework( port netty ) written in D.
Stars: ✭ 60 (-24.05%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+597.47%)
NsudoSeries of System Administration Tools
Stars: ✭ 945 (+1096.2%)
Invoke SocksproxySocks proxy, and reverse socks server using powershell.
Stars: ✭ 540 (+583.54%)
Sensu Plugins Network ChecksThis plugin provides native network instrumentation for monitoring and metrics collection, including: hardware, TCP response, RBLs, whois, port status, and more.
Stars: ✭ 28 (-64.56%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+36063.29%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+588.61%)