Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Croc | 22,163 | 4 days ago | 132 | May 18, 2022 | 107 | mit | Go | |||
Easily and securely send things from one computer to another :crocodile: :package: | ||||||||||
Masscan | 20,782 | 11 days ago | 1 | February 27, 2018 | 381 | other | C | |||
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ||||||||||
Wait For It | 8,267 | 4 months ago | September 23, 2022 | 75 | mit | Python | ||||
Pure bash script to test and wait on the availability of a TCP host and port | ||||||||||
Sish | 3,265 | 1 | a month ago | 34 | November 12, 2021 | 7 | mit | Go | ||
HTTP(S)/WS(S)/TCP Tunnels to localhost using only SSH. | ||||||||||
Openwrt Shadowsocks | 2,988 | 2 years ago | 1 | gpl-3.0 | Makefile | |||||
Shadowsocks-libev for OpenWrt/LEDE | ||||||||||
Server | 2,644 | 2 months ago | 75 | mit | JavaScript | |||||
server for localtunnel.me | ||||||||||
Kubernetes Security Best Practice | 2,323 | 4 years ago | 10 | apache-2.0 | ||||||
Kubernetes Security - Best Practice Guide | ||||||||||
Slipstream | 1,764 | 3 months ago | 5 | Perl | ||||||
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website | ||||||||||
Tcpflow | 1,367 | a year ago | 1 | February 27, 2018 | 61 | gpl-3.0 | C++ | |||
TCP/IP packet demultiplexer. Download from: | ||||||||||
Edumeet | 1,089 | 4 days ago | 4 | February 02, 2022 | 64 | mit | JavaScript | |||
edumeet - multiparty web-meetings using mediasoup and WebRTC |
User-space TCP/UDP port forwarding services
This project contains two applications: tcpfwd, udpfwd, which are for TCP and UDP port forwarding literally. Written in pure C.
tcpfwd|udpfwd <local_addr:local_port> <dest_addr:dest_port> [-d] [-o]
Options:
-d run in background
-o accept IPv6 connections only for IPv6 listener
-p <pidfile> write PID to file
tcpfwd 0.0.0.0:1022 192.168.1.77:22 # allow access from all hosts
tcpfwd 127.0.0.1:1022 192.168.1.77:22 # only allow localhost
tcpfwd [::]:1022 192.168.1.77:22 # allow access to port 1022 via both IPv4 and IPv6
udpfwd 0.0.0.0:53 8.8.8.8:53
udpfwd [::]:53 8.8.8.8:53
udpfwd [::]:1701 localhost:1701 # add IPv6 support for a local L2TP service
tcpfwd 0.0.0.0:80 [2001:db8:3::2]:80 # enable IPv4 access for an IPv6-only web service