DonnchaC / tor-hs-descriptor-fetcher
Simple tool to regularly pool Tor HSDirs for hidden service descriptors
☆10Updated 9 years ago
Alternatives and similar repositories for tor-hs-descriptor-fetcher:
Users that are interested in tor-hs-descriptor-fetcher are comparing it to the libraries listed below
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ☆27Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- YAPDNS☆39Updated 9 years ago
- ☆32Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Tools☆13Updated last year
- Malware Analysis Zoo☆25Updated 8 years ago
- ☆9Updated 9 years ago
- Powershell tool to download malware samples.☆12Updated 9 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- ☆16Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- post-exploitation tools☆15Updated 6 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago