Networking

Libraries for network programming

Newest releases

dinosaure contruno is a TLS termination proxy is a proxy server that acts as an intermediary point between client and server applications, and is used to establish TLS tunnels with let's encrypt certificates.
 

Ge0rg3 A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
 

P0ssuidao 🛡️ 🔒 This project's goal is to be simple to create and destroy your own VPN service using WireGuard.
 

bitclout BitClout is a decentralized social network. All of the code and data are totally open and anyone can build on the network or contribute code to improve it.
 

amalmurali47 onaws is a simple tool to check if an IP/hostname belongs to the AWS IP space or not. It uses the AWS IP address ranges data published by AWS to perform the search.
 

drecom Terraform is an IaC(infrastructure as code) software tool, which created by HashiCorp.
 

ZeroSimple A simple Python scrip for you to select the fastest IP for Microsoft services.
 

indianajson "Can I take over DNS?" — a list of DNS providers and how to claim (sub)domains via missing hosted zones
 

adulau A compilation of network scanning strategies to find vulnerable devices
 

prusnak Tool for pretty printing and optimizing Lightning Network channels.
 

Priler Simple, yet effective moderator bot for telegram. With reports, logs, profanity filter and more :3
 

mhaskar DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
 

souravbaghz RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol
 

Lapis0875 Python port of proxy-www (https://github.com/justjavac/proxy-www). Implemented additional functionalities!
 

shimmeris A little proxy tool based on Tencent Cloud Service.
 

loniceraLeo TlsProxys 基于TLS协议的http流量代理 安装 ※ 需要python3.7+ linux: sudo python3 -m pip install TlsProxys windows: pip install TlsProxys 基本用法 服务器端: $ tpserver [comman
 

Gowixx About okuru nuker is a nuker for discord written in python, It uses methods such as threading and requests to ban faster and perform at higher speeds.
 

samyk NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website
 

PrawnMan Streaming using a cheap HDMI capture card and a Raspberry Pi to an RTMP Receiver
 
6.6k

sshuttle Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
 

DreyAnd DeadDNS Multi-threaded DNS hijacking via dead records automation tool How it works 1) Dig provided subdomains file for dead DNS records. 2) Dig the fo
 

certego Pcapmonkey is a project that will provide an easy way to analyze pcap using the latest version of Suricata and Zeek. It can also save Suricata and Zeek logs in Elasticsearch using the new Elasticsearch Common Schema or the origina
 

thiagomayllart Harvis is a python tool to help you create multiple hauls for a specific operation during a red team engagement. It can automatically create your C2 machine, redirector machine, setup SSL, .htaccess configuration, firewall rules a
 

danhab99 LED Net Capture Flashes keyboard leds on incoming/outgoing network packets Usage Requires root priviledges to run usage: ledcapture.py [-h] --keyboard
 

FuzzySecurity This is just a quick run-down on setting up a private WG vpn server on Azure in a semi-automated fashion.
 

russelltao 网络协议2天集训
 

nautobot Nautobot was initially developed as a fork of NetBox (v2.10.4). NetBox was originally developed by Jeremy Stretch at Digital Ocean and the NetBox Community.
 

EONRaider A simple pure-Python TCP Connect port scanner. This application leverages the use of Python's Standard Library asyncio framework to execute a number of TCP connections to an arbitrary number ports on target IP addresses, taking a
 

iamthefrogy An automation tool that scans sub-domains using multiple tools. Most importantly, it greps all the words from the first, second and N level of subdomains and creates a wordlist. Then uses crt.sh to brute force every single name to
 

Nuand bladeRF-wiphy is an open-source IEEE 802.11 compatible software defined radio VHDL modem
 

pucherot WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
 

sdushantha Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily connect.Works on macOS and Linux and Windows