NC.exe 俗称黑客的瑞士军刀
Usage:
NetCat for Windows v1.14.89 https://github.com/diegocr/netcat connect to somewhere: nc [-options] hostname port[s] [ports] ... listen for inbound: nc -l -p port [options] [hostname] [port] options: -d detach from console, background mode -g gateway source-routing hop point[s], up to 8 -G num source-routing pointer: 4, 8, 12, ... -h this cruft -i secs delay interval for lines sent, ports scanned -l listen mode, for inbound connects -L listen harder, re-listen on socket close -n numeric-only IP addresses, no DNS -o file hex dump of traffic -p port local port number -r randomize local and remote ports -s addr local source address -t answer TELNET negotiation -u UDP mode -v verbose [use twice to be more verbose] -w secs timeout for connects and final net reads -x handle ansi escape codes -z zero-I/O mode [used for scanning] port numbers can be individual or ranges: m-n [inclusive]
常用方法:
nc -l -v 12155
下载地址:
版权声明:《 NC Listener 》为DYBOY原创文章,转载请注明出处!
最后编辑:2018-8-3 00:08:02