Repository for Tor's DNS-related issues.
☆17Dec 19, 2016Updated 9 years ago
Alternatives and similar repositories for tor-dns
Users that are interested in tor-dns are comparing it to the libraries listed below
Sorting:
- ☆11Jul 16, 2017Updated 8 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- ☆15Aug 11, 2014Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11May 1, 2017Updated 8 years ago
- CLI for Titan Suite☆13Dec 12, 2018Updated 7 years ago
- Nethunter kernel for Exynos7870 devices. works on both OneUi_Pie and Treble_Q_arm64 a only.☆10Dec 19, 2020Updated 5 years ago
- Over 50 doors for Minetest☆11Mar 31, 2025Updated 11 months ago
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- Convergent Dispersal Deduplication Datastore☆10Jan 21, 2016Updated 10 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Oct 20, 2018Updated 7 years ago
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- Spin up any(almost) llm locally!☆14Dec 4, 2023Updated 2 years ago
- P2P Crypto based on cooperative consensus☆13Feb 18, 2023Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago