Monitoring 'DNS' inside the Tor network
☆93Nov 21, 2016Updated 9 years ago
Alternatives and similar repositories for tor-dns
Users that are interested in tor-dns are comparing it to the libraries listed below
Sorting:
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- ☆42May 10, 2016Updated 9 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- ☆17Sep 22, 2016Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- ☆18Sep 22, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Multiple producer multiple consumer queue template using C++11 atomics.☆14Aug 26, 2021Updated 4 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 10 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- FFmpeg and DuiLib Plugin Demo☆10Jul 8, 2017Updated 8 years ago
- Historical Sources of the DirectSoundControl Wrapper☆12May 12, 2017Updated 8 years ago
- ☆10Jun 14, 2016Updated 9 years ago
- ...☆10Feb 16, 2015Updated 11 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago