Respounder is a network detection tool designed to identify the presence of Responder tools within a network environment. The tool operates by sending LLMNR (Link-Local Multicast Name Resolution) name resolution requests for fabricated hostnames that do not exist in the network infrastructure. This technique forces any active Responder instances to reveal themselves by responding to these queries. The tool supports multiple operating systems including 32-bit and 64-bit Linux distributions, OS X, and Windows systems. It can be deployed as pre-compiled binaries or built from source code using Golang without requiring additional dependencies. Respounder functions as a defensive security measure, helping network administrators and security professionals detect potentially malicious Responder tools that may be used for credential harvesting or man-in-the-middle attacks within their network perimeter.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.
Identify unintended network access to AWS resources and ensure network security by analyzing network reachability conditions.
A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
Scan the internet for publicly exposed network components
SentryPeer is a fraud detection tool that monitors and detects fraudulent activities on SIP servers, capturing IP addresses and phone numbers of suspicious activities and providing a notification system to service providers.
Stenographer is a high-performance full-packet-capture utility for intrusion detection and incident response purposes.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.