alfred-gw / torircLinks
Secure/anonymous IRC-like chat using TOR hidden services
☆40Updated 12 years ago
Alternatives and similar repositories for torirc
Users that are interested in torirc are comparing it to the libraries listed below
Sorting:
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Updated 5 months ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Man-in-the-middle against Tor bridges☆28Updated 5 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Updated 10 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
- Config generator for chaos vpn☆122Updated 3 years ago
- Simple detector of ARP poisoning attack☆29Updated 10 years ago
- Getting Envisioncollision to actually work.☆15Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Prints the IPs on your local network that're sending the most packets☆152Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Easily setup a hidden service inside the Tor network☆174Updated 2 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago