Bl-nK / torSpider
Spider for searching Onions for other Onions
☆10Updated 9 years ago
Alternatives and similar repositories for torSpider:
Users that are interested in torSpider are comparing it to the libraries listed below
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- An add-on to help TOR users find hidden services for ClearNet sites they use every day☆32Updated 7 years ago
- A Shell Script To Take Care Of Ubuntu Basics☆142Updated 4 years ago
- Tor Configuration Examples☆26Updated 9 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 5 years ago
- Password analysis software☆37Updated 9 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- A OS X crypto ransomware PoC☆87Updated 9 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago