NC Listener

NC.exe 俗称黑客的瑞士军刀

Test

Usage:

NetCat for Windows v1.14.89 https://github.com/diegocr/netcat
connect to somewhere:   nc [-options] hostname port[s] [ports] ...
listen for inbound:     nc -l -p port [options] [hostname] [port]
options:
        -d              detach from console, background mode
        -g gateway      source-routing hop point[s], up to 8
        -G num          source-routing pointer: 4, 8, 12, ...
        -h              this cruft
        -i secs         delay interval for lines sent, ports scanned
        -l              listen mode, for inbound connects
        -L              listen harder, re-listen on socket close
        -n              numeric-only IP addresses, no DNS
        -o file         hex dump of traffic
        -p port         local port number
        -r              randomize local and remote ports
        -s addr         local source address
        -t              answer TELNET negotiation
        -u              UDP mode
        -v              verbose [use twice to be more verbose]
        -w secs         timeout for connects and final net reads
        -x              handle ansi escape codes
        -z              zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]

常用方法:

nc -l -v 12155

下载地址:

nc.exe

发表评论 / Comment

用心评论~