LSE toolsLSE tools0trace (498)0trace (498)

Tool and Usage

Project details

Programming languages
C, shell script
Michał Zalewski
Latest release
No release found

Project health

This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

0trace is a reconnaissance tool to perform so-called hop enumeration within an established TCP connection. The goal is to allow traceroute-like functionality, yet in an alternative way. It can be used to bypass firewall rules. Tools like 0trace are typically used during pentesting assignments.

How it works

This tool works by leveraging an existing TCP session for a protocol like HTTP. As the network or firewall device already allowed the connection, this reuse of the connection is typically not detected.

The development of this tool looks to be stalled or stopped.

Usage and audience

0trace is commonly used for bypassing firewall rules, bypassing security measures, or penetration testing. Target users for this tool are pentesters and security professionals.


  • Command line interface

Author and Maintainers

0trace is under development by Michał Zalewski.


Supported operating systems

0trace is known to work on Linux.

0trace alternatives

Similar tools to 0trace:



FireAway is a security tool to test the security of a firewall by trying to bypass its rules. It will use different methods to hide data or avoid detection by the firewall itself. This tool can be used for both defensive as offensive security.



Opensvp is a security tool to test firewall software. It uses protocol level attacks to determine if the firewall is vulnerable to a type of attack.



Chiron is a security assessment framework for IPv6 testing. It can be used during penetration testing or analysis of network devices. Read how it works in this review.

All 0trace alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information


This tool is categorized as a firewall testing tool and network reconnaissance tools.