alfred-gw / torirc
Secure/anonymous IRC-like chat using TOR hidden services
☆38Updated 11 years ago
Related projects: ⓘ
- Man-in-the-middle against Tor bridges☆23Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆26Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆43Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆32Updated 6 months ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Metasploit things, modules, plugins, exploits☆24Updated 10 years ago
- Python botnet☆9Updated 9 years ago
- flood area with fake essids☆20Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 8 years ago
- Docker container for running an IRC server as a Tor hidden service☆50Updated 6 years ago
- ☆17Updated this week
- Attacking WPA/WPA encrypted access point without client.☆46Updated 10 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆20Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- Password cracking utility☆52Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆50Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆54Updated 6 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 6 years ago
- TOR Mail encrypted server for Hidden Services☆39Updated 8 years ago
- Wardriving ekoparty☆14Updated 6 years ago
- SSH Based Remote Administration Tool☆104Updated 9 years ago
- ArchPwn security linux live project☆21Updated 14 years ago
- ☆26Updated this week
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- ☆17Updated this week
- ☆19Updated this week