NullHypothesis / tor-dns
Repository for Tor's DNS-related issues.
☆17Updated 8 years ago
Alternatives and similar repositories for tor-dns:
Users that are interested in tor-dns are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- ☆36Updated 12 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- python tor client☆27Updated 9 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 7 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Network white noise collector☆18Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago