MeteorAdminz / hidden-tearLinks
an open source ransomware-like file crypter kit
☆13Updated 9 years ago
Alternatives and similar repositories for hidden-tear
Users that are interested in hidden-tear are comparing it to the libraries listed below
Sorting:
- rsmware forked C#/PHP/MySQL☆14Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Updated 10 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Deprecated. Use CoinHive Stratum instead.☆35Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆21Updated 11 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- ☆14Updated 9 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Transparent HTTP/S Content Filter using Adblock Plus filters and CSS selectors for Windows Vista and later.☆61Updated 8 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆49Updated 10 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago