alfred-gw / torirc
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 11 years ago
Alternatives and similar repositories for torirc:
Users that are interested in torirc are comparing it to the libraries listed below
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆47Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Getting Envisioncollision to actually work.☆12Updated 7 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Proxy scraper for proxychains☆45Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Google dorks generator to find open shells (on government sites)☆29Updated 10 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Python botnet☆9Updated 9 years ago
- flood area with fake essids☆20Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- ☆13Updated 10 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 8 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Create Tor hidden services in Python.☆51Updated last year
- python tor client☆26Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago