Respounder is a network detection tool designed to identify the presence of Responder tools within a network environment. The tool operates by sending LLMNR (Link-Local Multicast Name Resolution) name resolution requests for fabricated hostnames that do not exist in the network infrastructure. This technique forces any active Responder instances to reveal themselves by responding to these queries. The tool supports multiple operating systems including 32-bit and 64-bit Linux distributions, OS X, and Windows systems. It can be deployed as pre-compiled binaries or built from source code using Golang without requiring additional dependencies. Respounder functions as a defensive security measure, helping network administrators and security professionals detect potentially malicious Responder tools that may be used for credential harvesting or man-in-the-middle attacks within their network perimeter.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A free DNS recursive service that blocks malicious host names and protects user privacy.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
NBD is a user-space network protocol for sharing block devices over a network, allowing clients to access block devices on a server as if they were local.
Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.