https://github.com/ruda1106/socketshroud
LAN-level socket cloak and manipulation toolkit
https://github.com/ruda1106/socketshroud
debian decoy honeypot honeypots kali-linux-tools linux manipulation penetration-testing-tools pentesting proxy reconnaissance reroute socket-cloaking white-hat
Last synced: about 2 months ago
JSON representation
LAN-level socket cloak and manipulation toolkit
- Host: GitHub
- URL: https://github.com/ruda1106/socketshroud
- Owner: Ruda1106
- License: mit
- Created: 2025-04-11T14:34:29.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2025-04-12T01:51:07.000Z (about 2 months ago)
- Last Synced: 2025-04-12T02:15:30.048Z (about 2 months ago)
- Topics: debian, decoy, honeypot, honeypots, kali-linux-tools, linux, manipulation, penetration-testing-tools, pentesting, proxy, reconnaissance, reroute, socket-cloaking, white-hat
- Language: Python
- Size: 11.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SocketShroud 🕵️♂️

Welcome to **SocketShroud**, a powerful toolkit designed for LAN-level socket cloaking and manipulation. This project aims to enhance your penetration testing capabilities by providing tools to create decoys, honeypots, and proxies. Whether you are a seasoned security professional or a curious learner, SocketShroud offers a straightforward way to explore socket manipulation.
## Table of Contents
- [Introduction](#introduction)
- [Features](#features)
- [Installation](#installation)
- [Usage](#usage)
- [Topics](#topics)
- [Contributing](#contributing)
- [License](#license)
- [Links](#links)## Introduction
SocketShroud provides a suite of tools to manipulate and cloak sockets on a local area network (LAN). This toolkit is designed for white-hat hackers and penetration testers who need to create a safe environment for testing and reconnaissance. The ability to reroute traffic, create decoys, and set up honeypots makes SocketShroud an essential tool in your security arsenal.
## Features
- **Socket Cloaking**: Hide your actual socket connections to confuse potential attackers.
- **Decoy Creation**: Generate fake services that mimic real ones, drawing attention away from your actual targets.
- **Honeypot Deployment**: Set up traps to catch malicious actors and gather intelligence on their methods.
- **Traffic Manipulation**: Reroute or modify traffic in real-time for testing purposes.
- **User-Friendly Interface**: Easy to navigate, even for those new to penetration testing.## Installation
To get started with SocketShroud, download the latest release from the [Releases](https://github.com/Ruda1106/SocketShroud/releases) section. Follow these steps to install:
1. **Download the Release**: Visit the [Releases](https://github.com/Ruda1106/SocketShroud/releases) page and download the appropriate file for your system.
2. **Execute the File**: Run the downloaded file in your terminal. Ensure you have the necessary permissions to execute the file.```bash
chmod +x SocketShroud
./SocketShroud
```3. **Dependencies**: Make sure you have the required dependencies installed. Check the documentation for a list of necessary packages.
## Usage
Once installed, you can start using SocketShroud. Here are some basic commands to get you started:
### Starting a Honeypot
To start a honeypot, use the following command:
```bash
./SocketShroud honeypot --port 8080
```This command will initiate a honeypot on port 8080. You can change the port number as needed.
### Creating a Decoy
To create a decoy service, use:
```bash
./SocketShroud decoy --service http --port 80
```This will create a fake HTTP service on port 80.
### Rerouting Traffic
To reroute traffic from one socket to another, use:
```bash
./SocketShroud reroute --source --destination
```Replace `` and `` with the actual socket addresses.
## Topics
SocketShroud covers a range of topics relevant to network security and penetration testing:
- **Debian**: Optimized for Debian-based systems.
- **Decoy**: Techniques for creating decoy services.
- **Honeypot**: Setting up honeypots to trap attackers.
- **Kali Linux Tools**: Integrates well with existing Kali Linux tools.
- **Manipulation**: Various methods for manipulating socket connections.
- **Penetration Testing Tools**: A vital addition to your pentesting toolkit.
- **Proxy**: Setup and configuration of proxy servers.
- **Reconnaissance**: Tools for gathering information about your network.
- **Reroute**: Techniques for rerouting traffic.
- **Socket Cloaking**: Methods for hiding socket connections.
- **White Hat**: A focus on ethical hacking practices.## Contributing
We welcome contributions to SocketShroud! If you have ideas for new features, improvements, or bug fixes, please follow these steps:
1. Fork the repository.
2. Create a new branch for your feature or bug fix.
3. Make your changes and commit them.
4. Push your branch and submit a pull request.## License
SocketShroud is licensed under the MIT License. Feel free to use, modify, and distribute the code as long as you include the original license.
## Links
For more information, visit the [Releases](https://github.com/Ruda1106/SocketShroud/releases) section to download the latest version. You can also find documentation and support there.
---
Thank you for using SocketShroud! We hope this toolkit enhances your penetration testing efforts and helps you secure your networks effectively. Happy hacking!