LabunskyA / coverteleLinks
A truly private covert channel over the Telegram
☆26Updated 5 years ago
Alternatives and similar repositories for covertele
Users that are interested in covertele are comparing it to the libraries listed below
Sorting:
- Attack on a local network using an ARP vulnerability☆11Updated 4 years ago
- https://sync.me sucks☆16Updated 9 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Updated 8 years ago
- High-performance SOCKS5 server by Vee Security☆44Updated last year
- Repository for penetration testing tools☆36Updated 6 years ago
- 🐍 i2plib: A modern asynchronous library for building I2P applications☆37Updated 7 years ago
- Containerized pool of multiple Tor instances with load balancing and HTTP proxy.☆57Updated 3 years ago
- A tiny Tor client implementation (in pure python).☆132Updated 2 years ago
- 3WiFi Locator for Android☆17Updated 6 years ago
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Updated 13 years ago
- Google dorks generator to find open shells (on government sites)☆28Updated 11 years ago
- Multithreaded HTTP scanner☆46Updated 5 years ago
- Attempting to build an x86_64 assembly telegram bot with a bit of C☆26Updated 8 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 9 years ago
- Truecrypt volume parsing library☆33Updated 5 years ago
- Telegram Remote-Shell☆69Updated 2 years ago
- HTTP(S) directory/file brute forcer☆21Updated 2 years ago
- TorBOX Next Generation — Build a manageable TOR/I2P middle box on any modern Linux.☆30Updated 2 years ago
- Python application that aims at creating Telegram backups☆28Updated 8 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Updated 13 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Truehunter☆30Updated 4 years ago
- IoT device scanner.☆41Updated 6 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago