alfred-gw / torircLinks
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 11 years ago
Alternatives and similar repositories for torirc
Users that are interested in torirc are comparing it to the libraries listed below
Sorting:
- An IRC bot written in Python.☆74Updated 3 months ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆43Updated 6 years ago
- python tor client☆27Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- an ultimate evidence wiper☆65Updated 10 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)☆47Updated 3 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Removed according to regulations☆35Updated 8 years ago
- Panic button for protection against cold boot attacks☆143Updated 3 years ago
- kills all TCP connections on a network☆40Updated 9 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆49Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Proxy scraper for proxychains☆45Updated 4 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago