Library and tools to interact with and analyze Tor HSDirs.
☆72Feb 22, 2016Updated 10 years ago
Alternatives and similar repositories for hstools
Users that are interested in hstools are comparing it to the libraries listed below
Sorting:
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- "control-port-filter" without the bash☆14Jun 4, 2016Updated 9 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Easy creation of Tor Hidden Services☆40Jun 3, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- modern embeddable, transactional key-value database designed for a high load☆15Dec 5, 2013Updated 12 years ago
- signs things with ssh-ed25519 keys☆13Jan 4, 2019Updated 7 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Analysis of archived Tor relay RSA public keys☆24Dec 15, 2017Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Oct 5, 2015Updated 10 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- ☆15Mar 2, 2014Updated 12 years ago