stunner
Stunner
A tool for testing and exploiting STUN, TURN, and TCP servers to identify misconfigurations and vulnerabilities.
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
771 stars
15 watching
43 forks
Language: Go
last commit: 2 months ago
Linked from 1 awesome list
exploitmisconfigurationsecuritystuntestingtoolturnwebrtc
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to attempt various combinations of login credentials over a serial connection using Python | 16 |
| A tool used to identify potential security vulnerabilities in package maintainers of NPM and PyPi packages by checking for unregistered domains or email addresses. | 288 |
| An STUN client implementation to enable NAT traversal in network communications | 684 |
| A tool to bypass web application firewalls (WAFs) and test their effectiveness | 711 |
| A custom .NET assembly for gathering system information and performing situational awareness activities. | 121 |
| A tool for stealthy data transfer using DNS queries and text-based steganography to evade attribution and detection. | 624 |
| A tool that exploits vulnerabilities in web servers to execute arbitrary code | 9 |
| A fast and flexible web application testing tool that uses brute-force methods to discover vulnerabilities | 213 |
| Automates fuzz testing of web browsers and manages crashes to help identify security vulnerabilities | 416 |
| A framework for fuzzing web applications to detect vulnerabilities like command and SQL injection | 78 |
| A tool for generating and testing network protocol inputs to identify vulnerabilities | 2,057 |
| An extension for Burp Suite that enhances websocket testing capabilities by providing additional tools and features. | 87 |
| An FTP-based tool to execute malicious commands on a mainframe system using a CATSO/JCL wrapper | 24 |
| A tool that sends HTTP requests in a fast and controlled manner to discover or test vulnerabilities in web applications. | 464 |
| A tool to catalog files and their hashes to help in discovering file corruption, missing files, duplicates, etc. | 199 |