alfred-gw / torircLinks
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 12 years ago
Alternatives and similar repositories for torirc
Users that are interested in torirc are comparing it to the libraries listed below
Sorting:
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Updated 6 months ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Updated 7 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Updated 10 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Updated 9 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆23Updated 8 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago
- an ultimate evidence wiper☆65Updated 10 years ago
- TOR Mail encrypted server for Hidden Services☆44Updated 9 years ago
- Easily setup a hidden service inside the Tor network☆173Updated 2 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 9 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40Updated 11 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, send SMS messages from the system, execute re…☆64Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Ransomware written in vb.net for eduational purpouses☆13Updated 9 years ago
- A Cloudflare resolver that works☆145Updated 6 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- Windows Remote Administration Tool via Telegram☆36Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Updated 10 years ago