A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tpo/network-health/exitmap
☆459Oct 16, 2023Updated 2 years ago
Alternatives and similar repositories for exitmap
Users that are interested in exitmap are comparing it to the libraries listed below
Sorting:
- ☆33May 23, 2014Updated 11 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆525Oct 24, 2017Updated 8 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,012Jul 31, 2021Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Collection of tools for web recon and enumeration.☆56Jun 3, 2015Updated 10 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆513Jan 8, 2017Updated 9 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆790Sep 30, 2020Updated 5 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Apr 13, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- OnionScan is a free and open source tool for investigating the Dark Web.☆3,100Aug 9, 2024Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,225Nov 20, 2025Updated 3 months ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆419Feb 4, 2022Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,018Sep 11, 2017Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Cartero - Social Engineering Framework☆175Jun 23, 2020Updated 5 years ago