alfred-gw / torircLinks
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 12 years ago
Alternatives and similar repositories for torirc
Users that are interested in torirc are comparing it to the libraries listed below
Sorting:
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Updated 6 months ago
- Easily setup a hidden service inside the Tor network☆173Updated 2 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆147Updated 10 years ago
- an ultimate evidence wiper☆65Updated 10 years ago
- Athena Botnet Source Code☆156Updated 10 years ago
- An IRC bot written in Python.☆76Updated last week
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- Mass malicious script dump/Malware src dump☆57Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31Updated 8 years ago
- Simple detector of ARP poisoning attack☆29Updated 10 years ago
- A Cloudflare resolver that works☆145Updated 6 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago