A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tpo/network-health/exitmap
☆460Oct 16, 2023Updated 2 years ago
Alternatives and similar repositories for exitmap
Users that are interested in exitmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33May 23, 2014Updated 11 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆82Jun 4, 2013Updated 12 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,012Jul 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 9 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Collection of tools for web recon and enumeration.☆57Jun 3, 2015Updated 10 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆533Oct 24, 2017Updated 8 years ago
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- OnionScan is a free and open source tool for investigating the Dark Web.☆3,232Aug 9, 2024Updated last year
- PLASMA PULSAR☆70May 19, 2017Updated 9 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- A low to medium interaction honeypot.☆475Mar 21, 2024Updated 2 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆427Feb 18, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A fully featured backdoor that uses Twitter as a C&C server☆795Sep 30, 2020Updated 5 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆514Jan 8, 2017Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆528Apr 13, 2017Updated 9 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆419Feb 4, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [unmaintained] Post-exploitation tool☆182Jan 28, 2016Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆100Dec 1, 2024Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆871Aug 24, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆162Aug 5, 2016Updated 9 years ago