alfred-gw / torirc
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 11 years ago
Alternatives and similar repositories for torirc
Users that are interested in torirc are comparing it to the libraries listed below
Sorting:
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- python tor client☆27Updated 9 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- ☆13Updated 10 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Extracting information from phone numbers☆5Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆31Updated 6 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Updated 11 years ago
- ☆12Updated 8 years ago
- Create Containerized Clearnet Proxies☆30Updated 6 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆28Updated 7 years ago
- A curated list of awesome Go frameworks, libraries and software☆15Updated 7 years ago
- flood area with fake essids☆21Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Removed according to regulations☆35Updated 7 years ago